Dec 13 14:13:36.950643 kernel: Booting Linux on physical CPU 0x0000000000 [0x410fd083] Dec 13 14:13:36.950680 kernel: Linux version 5.15.173-flatcar (build@pony-truck.infra.kinvolk.io) (aarch64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP PREEMPT Fri Dec 13 12:58:58 -00 2024 Dec 13 14:13:36.950702 kernel: efi: EFI v2.70 by EDK II Dec 13 14:13:36.950718 kernel: efi: SMBIOS=0x7bed0000 SMBIOS 3.0=0x7beb0000 ACPI=0x786e0000 ACPI 2.0=0x786e0014 MEMATTR=0x7b003a98 MEMRESERVE=0x7171cf98 Dec 13 14:13:36.950731 kernel: ACPI: Early table checksum verification disabled Dec 13 14:13:36.950745 kernel: ACPI: RSDP 0x00000000786E0014 000024 (v02 AMAZON) Dec 13 14:13:36.950761 kernel: ACPI: XSDT 0x00000000786D00E8 000064 (v01 AMAZON AMZNFACP 00000001 01000013) Dec 13 14:13:36.950775 kernel: ACPI: FACP 0x00000000786B0000 000114 (v06 AMAZON AMZNFACP 00000001 AMZN 00000001) Dec 13 14:13:36.950789 kernel: ACPI: DSDT 0x0000000078640000 00159D (v02 AMAZON AMZNDSDT 00000001 INTL 20160527) Dec 13 14:13:36.950803 kernel: ACPI: APIC 0x00000000786C0000 000108 (v04 AMAZON AMZNAPIC 00000001 AMZN 00000001) Dec 13 14:13:36.950821 kernel: ACPI: SPCR 0x00000000786A0000 000050 (v02 AMAZON AMZNSPCR 00000001 AMZN 00000001) Dec 13 14:13:36.950835 kernel: ACPI: GTDT 0x0000000078690000 000060 (v02 AMAZON AMZNGTDT 00000001 AMZN 00000001) Dec 13 14:13:36.950863 kernel: ACPI: MCFG 0x0000000078680000 00003C (v02 AMAZON AMZNMCFG 00000001 AMZN 00000001) Dec 13 14:13:36.950881 kernel: ACPI: SLIT 0x0000000078670000 00002D (v01 AMAZON AMZNSLIT 00000001 AMZN 00000001) Dec 13 14:13:36.950898 kernel: ACPI: IORT 0x0000000078660000 000078 (v01 AMAZON AMZNIORT 00000001 AMZN 00000001) Dec 13 14:13:36.950919 kernel: ACPI: PPTT 0x0000000078650000 0000EC (v01 AMAZON AMZNPPTT 00000001 AMZN 00000001) Dec 13 14:13:36.950934 kernel: ACPI: SPCR: console: uart,mmio,0x90a0000,115200 Dec 13 14:13:36.950949 kernel: earlycon: uart0 at MMIO 0x00000000090a0000 (options '115200') Dec 13 14:13:36.950964 kernel: printk: bootconsole [uart0] enabled Dec 13 14:13:36.950978 kernel: NUMA: Failed to initialise from firmware Dec 13 14:13:36.950993 kernel: NUMA: Faking a node at [mem 0x0000000040000000-0x00000004b5ffffff] Dec 13 14:13:36.951008 kernel: NUMA: NODE_DATA [mem 0x4b5843900-0x4b5848fff] Dec 13 14:13:36.951022 kernel: Zone ranges: Dec 13 14:13:36.951037 kernel: DMA [mem 0x0000000040000000-0x00000000ffffffff] Dec 13 14:13:36.951051 kernel: DMA32 empty Dec 13 14:13:36.951065 kernel: Normal [mem 0x0000000100000000-0x00000004b5ffffff] Dec 13 14:13:36.951084 kernel: Movable zone start for each node Dec 13 14:13:36.951098 kernel: Early memory node ranges Dec 13 14:13:36.951113 kernel: node 0: [mem 0x0000000040000000-0x000000007862ffff] Dec 13 14:13:36.951128 kernel: node 0: [mem 0x0000000078630000-0x000000007863ffff] Dec 13 14:13:36.951142 kernel: node 0: [mem 0x0000000078640000-0x00000000786effff] Dec 13 14:13:36.951157 kernel: node 0: [mem 0x00000000786f0000-0x000000007872ffff] Dec 13 14:13:36.951171 kernel: node 0: [mem 0x0000000078730000-0x000000007bbfffff] Dec 13 14:13:36.951185 kernel: node 0: [mem 0x000000007bc00000-0x000000007bfdffff] Dec 13 14:13:36.951200 kernel: node 0: [mem 0x000000007bfe0000-0x000000007fffffff] Dec 13 14:13:36.951214 kernel: node 0: [mem 0x0000000400000000-0x00000004b5ffffff] Dec 13 14:13:36.951229 kernel: Initmem setup node 0 [mem 0x0000000040000000-0x00000004b5ffffff] Dec 13 14:13:36.951243 kernel: On node 0, zone Normal: 8192 pages in unavailable ranges Dec 13 14:13:36.951262 kernel: psci: probing for conduit method from ACPI. Dec 13 14:13:36.951277 kernel: psci: PSCIv1.0 detected in firmware. Dec 13 14:13:36.951297 kernel: psci: Using standard PSCI v0.2 function IDs Dec 13 14:13:36.951313 kernel: psci: Trusted OS migration not required Dec 13 14:13:36.951328 kernel: psci: SMC Calling Convention v1.1 Dec 13 14:13:36.951347 kernel: ACPI: SRAT not present Dec 13 14:13:36.951363 kernel: percpu: Embedded 30 pages/cpu s83032 r8192 d31656 u122880 Dec 13 14:13:36.951378 kernel: pcpu-alloc: s83032 r8192 d31656 u122880 alloc=30*4096 Dec 13 14:13:36.951394 kernel: pcpu-alloc: [0] 0 [0] 1 Dec 13 14:13:36.951409 kernel: Detected PIPT I-cache on CPU0 Dec 13 14:13:36.951443 kernel: CPU features: detected: GIC system register CPU interface Dec 13 14:13:36.951460 kernel: CPU features: detected: Spectre-v2 Dec 13 14:13:36.951475 kernel: CPU features: detected: Spectre-v3a Dec 13 14:13:36.951490 kernel: CPU features: detected: Spectre-BHB Dec 13 14:13:36.951505 kernel: CPU features: kernel page table isolation forced ON by KASLR Dec 13 14:13:36.951520 kernel: CPU features: detected: Kernel page table isolation (KPTI) Dec 13 14:13:36.951540 kernel: CPU features: detected: ARM erratum 1742098 Dec 13 14:13:36.951556 kernel: CPU features: detected: ARM errata 1165522, 1319367, or 1530923 Dec 13 14:13:36.951572 kernel: Built 1 zonelists, mobility grouping on. Total pages: 991872 Dec 13 14:13:36.951587 kernel: Policy zone: Normal Dec 13 14:13:36.951605 kernel: Kernel command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlycon flatcar.first_boot=detected acpi=force flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=5997a8cf94b1df1856dc785f0a7074604bbf4c21fdcca24a1996021471a77601 Dec 13 14:13:36.951622 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Dec 13 14:13:36.951637 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Dec 13 14:13:36.951653 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Dec 13 14:13:36.951668 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Dec 13 14:13:36.951684 kernel: software IO TLB: mapped [mem 0x000000007c000000-0x0000000080000000] (64MB) Dec 13 14:13:36.951704 kernel: Memory: 3824524K/4030464K available (9792K kernel code, 2092K rwdata, 7576K rodata, 36416K init, 777K bss, 205940K reserved, 0K cma-reserved) Dec 13 14:13:36.951720 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Dec 13 14:13:36.951735 kernel: trace event string verifier disabled Dec 13 14:13:36.951751 kernel: rcu: Preemptible hierarchical RCU implementation. Dec 13 14:13:36.951767 kernel: rcu: RCU event tracing is enabled. Dec 13 14:13:36.951783 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Dec 13 14:13:36.951798 kernel: Trampoline variant of Tasks RCU enabled. Dec 13 14:13:36.951814 kernel: Tracing variant of Tasks RCU enabled. Dec 13 14:13:36.951830 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Dec 13 14:13:36.951845 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Dec 13 14:13:36.951861 kernel: NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0 Dec 13 14:13:36.951913 kernel: GICv3: 96 SPIs implemented Dec 13 14:13:36.951936 kernel: GICv3: 0 Extended SPIs implemented Dec 13 14:13:36.951952 kernel: GICv3: Distributor has no Range Selector support Dec 13 14:13:36.951967 kernel: Root IRQ handler: gic_handle_irq Dec 13 14:13:36.951982 kernel: GICv3: 16 PPIs implemented Dec 13 14:13:36.951997 kernel: GICv3: CPU0: found redistributor 0 region 0:0x0000000010200000 Dec 13 14:13:36.952012 kernel: ACPI: SRAT not present Dec 13 14:13:36.952027 kernel: ITS [mem 0x10080000-0x1009ffff] Dec 13 14:13:36.952043 kernel: ITS@0x0000000010080000: allocated 8192 Devices @400090000 (indirect, esz 8, psz 64K, shr 1) Dec 13 14:13:36.952058 kernel: ITS@0x0000000010080000: allocated 8192 Interrupt Collections @4000a0000 (flat, esz 8, psz 64K, shr 1) Dec 13 14:13:36.952074 kernel: GICv3: using LPI property table @0x00000004000b0000 Dec 13 14:13:36.952089 kernel: ITS: Using hypervisor restricted LPI range [128] Dec 13 14:13:36.952109 kernel: GICv3: CPU0: using allocated LPI pending table @0x00000004000d0000 Dec 13 14:13:36.952125 kernel: arch_timer: cp15 timer(s) running at 83.33MHz (virt). Dec 13 14:13:36.952140 kernel: clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0x13381ebeec, max_idle_ns: 440795203145 ns Dec 13 14:13:36.952156 kernel: sched_clock: 56 bits at 83MHz, resolution 12ns, wraps every 4398046511100ns Dec 13 14:13:36.952172 kernel: Console: colour dummy device 80x25 Dec 13 14:13:36.952188 kernel: printk: console [tty1] enabled Dec 13 14:13:36.952204 kernel: ACPI: Core revision 20210730 Dec 13 14:13:36.952220 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 166.66 BogoMIPS (lpj=83333) Dec 13 14:13:36.952236 kernel: pid_max: default: 32768 minimum: 301 Dec 13 14:13:36.952288 kernel: LSM: Security Framework initializing Dec 13 14:13:36.952312 kernel: SELinux: Initializing. Dec 13 14:13:36.952329 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Dec 13 14:13:36.952345 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Dec 13 14:13:36.952361 kernel: rcu: Hierarchical SRCU implementation. Dec 13 14:13:36.952376 kernel: Platform MSI: ITS@0x10080000 domain created Dec 13 14:13:36.952392 kernel: PCI/MSI: ITS@0x10080000 domain created Dec 13 14:13:36.952408 kernel: Remapping and enabling EFI services. Dec 13 14:13:36.952448 kernel: smp: Bringing up secondary CPUs ... Dec 13 14:13:36.952466 kernel: Detected PIPT I-cache on CPU1 Dec 13 14:13:36.952482 kernel: GICv3: CPU1: found redistributor 1 region 0:0x0000000010220000 Dec 13 14:13:36.952503 kernel: GICv3: CPU1: using allocated LPI pending table @0x00000004000e0000 Dec 13 14:13:36.952519 kernel: CPU1: Booted secondary processor 0x0000000001 [0x410fd083] Dec 13 14:13:36.952535 kernel: smp: Brought up 1 node, 2 CPUs Dec 13 14:13:36.952550 kernel: SMP: Total of 2 processors activated. Dec 13 14:13:36.952566 kernel: CPU features: detected: 32-bit EL0 Support Dec 13 14:13:36.952581 kernel: CPU features: detected: 32-bit EL1 Support Dec 13 14:13:36.952597 kernel: CPU features: detected: CRC32 instructions Dec 13 14:13:36.952612 kernel: CPU: All CPU(s) started at EL1 Dec 13 14:13:36.952627 kernel: alternatives: patching kernel code Dec 13 14:13:36.952647 kernel: devtmpfs: initialized Dec 13 14:13:36.952663 kernel: KASLR disabled due to lack of seed Dec 13 14:13:36.952689 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Dec 13 14:13:36.952709 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Dec 13 14:13:36.952725 kernel: pinctrl core: initialized pinctrl subsystem Dec 13 14:13:36.952741 kernel: SMBIOS 3.0.0 present. Dec 13 14:13:36.952757 kernel: DMI: Amazon EC2 a1.large/, BIOS 1.0 11/1/2018 Dec 13 14:13:36.952774 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Dec 13 14:13:36.952790 kernel: DMA: preallocated 512 KiB GFP_KERNEL pool for atomic allocations Dec 13 14:13:36.952807 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations Dec 13 14:13:36.952823 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations Dec 13 14:13:36.952843 kernel: audit: initializing netlink subsys (disabled) Dec 13 14:13:36.952860 kernel: audit: type=2000 audit(0.248:1): state=initialized audit_enabled=0 res=1 Dec 13 14:13:36.952876 kernel: thermal_sys: Registered thermal governor 'step_wise' Dec 13 14:13:36.952892 kernel: cpuidle: using governor menu Dec 13 14:13:36.952908 kernel: hw-breakpoint: found 6 breakpoint and 4 watchpoint registers. Dec 13 14:13:36.952928 kernel: ASID allocator initialised with 32768 entries Dec 13 14:13:36.952945 kernel: ACPI: bus type PCI registered Dec 13 14:13:36.952961 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Dec 13 14:13:36.952977 kernel: Serial: AMBA PL011 UART driver Dec 13 14:13:36.952994 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Dec 13 14:13:36.953010 kernel: HugeTLB registered 32.0 MiB page size, pre-allocated 0 pages Dec 13 14:13:36.953026 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Dec 13 14:13:36.953042 kernel: HugeTLB registered 64.0 KiB page size, pre-allocated 0 pages Dec 13 14:13:36.953058 kernel: cryptd: max_cpu_qlen set to 1000 Dec 13 14:13:36.953078 kernel: alg: No test for fips(ansi_cprng) (fips_ansi_cprng) Dec 13 14:13:36.953095 kernel: ACPI: Added _OSI(Module Device) Dec 13 14:13:36.953111 kernel: ACPI: Added _OSI(Processor Device) Dec 13 14:13:36.953127 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Dec 13 14:13:36.953143 kernel: ACPI: Added _OSI(Processor Aggregator Device) Dec 13 14:13:36.953159 kernel: ACPI: Added _OSI(Linux-Dell-Video) Dec 13 14:13:36.953175 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Dec 13 14:13:36.953191 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Dec 13 14:13:36.953208 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Dec 13 14:13:36.953228 kernel: ACPI: Interpreter enabled Dec 13 14:13:36.953244 kernel: ACPI: Using GIC for interrupt routing Dec 13 14:13:36.953260 kernel: ACPI: MCFG table detected, 1 entries Dec 13 14:13:36.953276 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-0f]) Dec 13 14:13:36.953566 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Dec 13 14:13:36.953759 kernel: acpi PNP0A08:00: _OSC: platform does not support [LTR] Dec 13 14:13:36.953944 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME AER PCIeCapability] Dec 13 14:13:36.954128 kernel: acpi PNP0A08:00: ECAM area [mem 0x20000000-0x20ffffff] reserved by PNP0C02:00 Dec 13 14:13:36.955632 kernel: acpi PNP0A08:00: ECAM at [mem 0x20000000-0x20ffffff] for [bus 00-0f] Dec 13 14:13:36.955665 kernel: ACPI: Remapped I/O 0x000000001fff0000 to [io 0x0000-0xffff window] Dec 13 14:13:36.955683 kernel: acpiphp: Slot [1] registered Dec 13 14:13:36.955700 kernel: acpiphp: Slot [2] registered Dec 13 14:13:36.955716 kernel: acpiphp: Slot [3] registered Dec 13 14:13:36.955732 kernel: acpiphp: Slot [4] registered Dec 13 14:13:36.955749 kernel: acpiphp: Slot [5] registered Dec 13 14:13:36.955765 kernel: acpiphp: Slot [6] registered Dec 13 14:13:36.955780 kernel: acpiphp: Slot [7] registered Dec 13 14:13:36.955804 kernel: acpiphp: Slot [8] registered Dec 13 14:13:36.955820 kernel: acpiphp: Slot [9] registered Dec 13 14:13:36.955836 kernel: acpiphp: Slot [10] registered Dec 13 14:13:36.955852 kernel: acpiphp: Slot [11] registered Dec 13 14:13:36.955868 kernel: acpiphp: Slot [12] registered Dec 13 14:13:36.955884 kernel: acpiphp: Slot [13] registered Dec 13 14:13:36.955900 kernel: acpiphp: Slot [14] registered Dec 13 14:13:36.955916 kernel: acpiphp: Slot [15] registered Dec 13 14:13:36.955932 kernel: acpiphp: Slot [16] registered Dec 13 14:13:36.955952 kernel: acpiphp: Slot [17] registered Dec 13 14:13:36.955968 kernel: acpiphp: Slot [18] registered Dec 13 14:13:36.955984 kernel: acpiphp: Slot [19] registered Dec 13 14:13:36.956000 kernel: acpiphp: Slot [20] registered Dec 13 14:13:36.956016 kernel: acpiphp: Slot [21] registered Dec 13 14:13:36.956032 kernel: acpiphp: Slot [22] registered Dec 13 14:13:36.956048 kernel: acpiphp: Slot [23] registered Dec 13 14:13:36.956064 kernel: acpiphp: Slot [24] registered Dec 13 14:13:36.956080 kernel: acpiphp: Slot [25] registered Dec 13 14:13:36.956096 kernel: acpiphp: Slot [26] registered Dec 13 14:13:36.956116 kernel: acpiphp: Slot [27] registered Dec 13 14:13:36.956132 kernel: acpiphp: Slot [28] registered Dec 13 14:13:36.956148 kernel: acpiphp: Slot [29] registered Dec 13 14:13:36.956164 kernel: acpiphp: Slot [30] registered Dec 13 14:13:36.956180 kernel: acpiphp: Slot [31] registered Dec 13 14:13:36.956196 kernel: PCI host bridge to bus 0000:00 Dec 13 14:13:36.956383 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xffffffff window] Dec 13 14:13:36.956618 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0xffff window] Dec 13 14:13:36.956798 kernel: pci_bus 0000:00: root bus resource [mem 0x400000000000-0x407fffffffff window] Dec 13 14:13:36.956977 kernel: pci_bus 0000:00: root bus resource [bus 00-0f] Dec 13 14:13:36.958642 kernel: pci 0000:00:00.0: [1d0f:0200] type 00 class 0x060000 Dec 13 14:13:36.959512 kernel: pci 0000:00:01.0: [1d0f:8250] type 00 class 0x070003 Dec 13 14:13:36.959738 kernel: pci 0000:00:01.0: reg 0x10: [mem 0x80118000-0x80118fff] Dec 13 14:13:36.959969 kernel: pci 0000:00:04.0: [1d0f:8061] type 00 class 0x010802 Dec 13 14:13:36.960195 kernel: pci 0000:00:04.0: reg 0x10: [mem 0x80114000-0x80117fff] Dec 13 14:13:36.960410 kernel: pci 0000:00:04.0: PME# supported from D0 D1 D2 D3hot D3cold Dec 13 14:13:36.960677 kernel: pci 0000:00:05.0: [1d0f:ec20] type 00 class 0x020000 Dec 13 14:13:36.960896 kernel: pci 0000:00:05.0: reg 0x10: [mem 0x80110000-0x80113fff] Dec 13 14:13:36.961112 kernel: pci 0000:00:05.0: reg 0x18: [mem 0x80000000-0x800fffff pref] Dec 13 14:13:36.961342 kernel: pci 0000:00:05.0: reg 0x20: [mem 0x80100000-0x8010ffff] Dec 13 14:13:36.961583 kernel: pci 0000:00:05.0: PME# supported from D0 D1 D2 D3hot D3cold Dec 13 14:13:36.961805 kernel: pci 0000:00:05.0: BAR 2: assigned [mem 0x80000000-0x800fffff pref] Dec 13 14:13:36.962019 kernel: pci 0000:00:05.0: BAR 4: assigned [mem 0x80100000-0x8010ffff] Dec 13 14:13:36.962233 kernel: pci 0000:00:04.0: BAR 0: assigned [mem 0x80110000-0x80113fff] Dec 13 14:13:36.962466 kernel: pci 0000:00:05.0: BAR 0: assigned [mem 0x80114000-0x80117fff] Dec 13 14:13:36.962693 kernel: pci 0000:00:01.0: BAR 0: assigned [mem 0x80118000-0x80118fff] Dec 13 14:13:36.962911 kernel: pci_bus 0000:00: resource 4 [mem 0x80000000-0xffffffff window] Dec 13 14:13:36.963119 kernel: pci_bus 0000:00: resource 5 [io 0x0000-0xffff window] Dec 13 14:13:36.963329 kernel: pci_bus 0000:00: resource 6 [mem 0x400000000000-0x407fffffffff window] Dec 13 14:13:36.963352 kernel: ACPI: PCI: Interrupt link GSI0 configured for IRQ 35 Dec 13 14:13:36.963369 kernel: ACPI: PCI: Interrupt link GSI1 configured for IRQ 36 Dec 13 14:13:36.963386 kernel: ACPI: PCI: Interrupt link GSI2 configured for IRQ 37 Dec 13 14:13:36.963403 kernel: ACPI: PCI: Interrupt link GSI3 configured for IRQ 38 Dec 13 14:13:36.963435 kernel: iommu: Default domain type: Translated Dec 13 14:13:36.963455 kernel: iommu: DMA domain TLB invalidation policy: strict mode Dec 13 14:13:36.963471 kernel: vgaarb: loaded Dec 13 14:13:36.963488 kernel: pps_core: LinuxPPS API ver. 1 registered Dec 13 14:13:36.963510 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Dec 13 14:13:36.963526 kernel: PTP clock support registered Dec 13 14:13:36.963543 kernel: Registered efivars operations Dec 13 14:13:36.963559 kernel: clocksource: Switched to clocksource arch_sys_counter Dec 13 14:13:36.963575 kernel: VFS: Disk quotas dquot_6.6.0 Dec 13 14:13:36.963592 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Dec 13 14:13:36.963608 kernel: pnp: PnP ACPI init Dec 13 14:13:36.963841 kernel: system 00:00: [mem 0x20000000-0x2fffffff] could not be reserved Dec 13 14:13:36.963869 kernel: pnp: PnP ACPI: found 1 devices Dec 13 14:13:36.963886 kernel: NET: Registered PF_INET protocol family Dec 13 14:13:36.963903 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Dec 13 14:13:36.963920 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Dec 13 14:13:36.963936 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Dec 13 14:13:36.963953 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Dec 13 14:13:36.963970 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Dec 13 14:13:36.963986 kernel: TCP: Hash tables configured (established 32768 bind 32768) Dec 13 14:13:36.964003 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Dec 13 14:13:36.964023 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Dec 13 14:13:36.964039 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Dec 13 14:13:36.964056 kernel: PCI: CLS 0 bytes, default 64 Dec 13 14:13:36.964072 kernel: hw perfevents: enabled with armv8_pmuv3_0 PMU driver, 3 counters available Dec 13 14:13:36.964088 kernel: kvm [1]: HYP mode not available Dec 13 14:13:36.964105 kernel: Initialise system trusted keyrings Dec 13 14:13:36.964122 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Dec 13 14:13:36.964138 kernel: Key type asymmetric registered Dec 13 14:13:36.964154 kernel: Asymmetric key parser 'x509' registered Dec 13 14:13:36.964174 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Dec 13 14:13:36.964191 kernel: io scheduler mq-deadline registered Dec 13 14:13:36.964207 kernel: io scheduler kyber registered Dec 13 14:13:36.964223 kernel: io scheduler bfq registered Dec 13 14:13:36.964463 kernel: pl061_gpio ARMH0061:00: PL061 GPIO chip registered Dec 13 14:13:36.964490 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0C:00/input/input0 Dec 13 14:13:36.964507 kernel: ACPI: button: Power Button [PWRB] Dec 13 14:13:36.964524 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0E:00/input/input1 Dec 13 14:13:36.964545 kernel: ACPI: button: Sleep Button [SLPB] Dec 13 14:13:36.964562 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Dec 13 14:13:36.964579 kernel: ACPI: \_SB_.PCI0.GSI2: Enabled at IRQ 37 Dec 13 14:13:36.964799 kernel: serial 0000:00:01.0: enabling device (0010 -> 0012) Dec 13 14:13:36.964822 kernel: printk: console [ttyS0] disabled Dec 13 14:13:36.964839 kernel: 0000:00:01.0: ttyS0 at MMIO 0x80118000 (irq = 14, base_baud = 115200) is a 16550A Dec 13 14:13:36.964856 kernel: printk: console [ttyS0] enabled Dec 13 14:13:36.964873 kernel: printk: bootconsole [uart0] disabled Dec 13 14:13:36.964889 kernel: thunder_xcv, ver 1.0 Dec 13 14:13:36.964905 kernel: thunder_bgx, ver 1.0 Dec 13 14:13:36.964926 kernel: nicpf, ver 1.0 Dec 13 14:13:36.964942 kernel: nicvf, ver 1.0 Dec 13 14:13:36.965161 kernel: rtc-efi rtc-efi.0: registered as rtc0 Dec 13 14:13:36.965372 kernel: rtc-efi rtc-efi.0: setting system clock to 2024-12-13T14:13:36 UTC (1734099216) Dec 13 14:13:36.965395 kernel: hid: raw HID events driver (C) Jiri Kosina Dec 13 14:13:36.965412 kernel: NET: Registered PF_INET6 protocol family Dec 13 14:13:36.965447 kernel: Segment Routing with IPv6 Dec 13 14:13:36.965464 kernel: In-situ OAM (IOAM) with IPv6 Dec 13 14:13:36.965486 kernel: NET: Registered PF_PACKET protocol family Dec 13 14:13:36.965503 kernel: Key type dns_resolver registered Dec 13 14:13:36.965519 kernel: registered taskstats version 1 Dec 13 14:13:36.965535 kernel: Loading compiled-in X.509 certificates Dec 13 14:13:36.965553 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.173-flatcar: e011ba9949ade5a6d03f7a5e28171f7f59e70f8a' Dec 13 14:13:36.965570 kernel: Key type .fscrypt registered Dec 13 14:13:36.975481 kernel: Key type fscrypt-provisioning registered Dec 13 14:13:36.975500 kernel: ima: No TPM chip found, activating TPM-bypass! Dec 13 14:13:36.975518 kernel: ima: Allocated hash algorithm: sha1 Dec 13 14:13:36.975545 kernel: ima: No architecture policies found Dec 13 14:13:36.975561 kernel: clk: Disabling unused clocks Dec 13 14:13:36.975578 kernel: Freeing unused kernel memory: 36416K Dec 13 14:13:36.975594 kernel: Run /init as init process Dec 13 14:13:36.975610 kernel: with arguments: Dec 13 14:13:36.975627 kernel: /init Dec 13 14:13:36.975642 kernel: with environment: Dec 13 14:13:36.975658 kernel: HOME=/ Dec 13 14:13:36.975674 kernel: TERM=linux Dec 13 14:13:36.975694 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Dec 13 14:13:36.975716 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 14:13:36.975738 systemd[1]: Detected virtualization amazon. Dec 13 14:13:36.975756 systemd[1]: Detected architecture arm64. Dec 13 14:13:36.975774 systemd[1]: Running in initrd. Dec 13 14:13:36.975791 systemd[1]: No hostname configured, using default hostname. Dec 13 14:13:36.975808 systemd[1]: Hostname set to . Dec 13 14:13:36.975831 systemd[1]: Initializing machine ID from VM UUID. Dec 13 14:13:36.975849 systemd[1]: Queued start job for default target initrd.target. Dec 13 14:13:36.975867 systemd[1]: Started systemd-ask-password-console.path. Dec 13 14:13:36.975885 systemd[1]: Reached target cryptsetup.target. Dec 13 14:13:36.975902 systemd[1]: Reached target paths.target. Dec 13 14:13:36.975920 systemd[1]: Reached target slices.target. Dec 13 14:13:36.975937 systemd[1]: Reached target swap.target. Dec 13 14:13:36.975955 systemd[1]: Reached target timers.target. Dec 13 14:13:36.975977 systemd[1]: Listening on iscsid.socket. Dec 13 14:13:36.975994 systemd[1]: Listening on iscsiuio.socket. Dec 13 14:13:36.976013 systemd[1]: Listening on systemd-journald-audit.socket. Dec 13 14:13:36.976030 systemd[1]: Listening on systemd-journald-dev-log.socket. Dec 13 14:13:36.976048 systemd[1]: Listening on systemd-journald.socket. Dec 13 14:13:36.976066 systemd[1]: Listening on systemd-networkd.socket. Dec 13 14:13:36.976083 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 14:13:36.976101 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 14:13:36.976123 systemd[1]: Reached target sockets.target. Dec 13 14:13:36.976141 systemd[1]: Starting kmod-static-nodes.service... Dec 13 14:13:36.976158 systemd[1]: Finished network-cleanup.service. Dec 13 14:13:36.976176 systemd[1]: Starting systemd-fsck-usr.service... Dec 13 14:13:36.976194 systemd[1]: Starting systemd-journald.service... Dec 13 14:13:36.976211 systemd[1]: Starting systemd-modules-load.service... Dec 13 14:13:36.976243 systemd[1]: Starting systemd-resolved.service... Dec 13 14:13:36.976263 systemd[1]: Starting systemd-vconsole-setup.service... Dec 13 14:13:36.976282 systemd[1]: Finished kmod-static-nodes.service. Dec 13 14:13:36.976305 kernel: audit: type=1130 audit(1734099216.943:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:36.976323 systemd[1]: Finished systemd-fsck-usr.service. Dec 13 14:13:36.976342 kernel: audit: type=1130 audit(1734099216.957:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:36.976359 systemd[1]: Finished systemd-vconsole-setup.service. Dec 13 14:13:36.976377 systemd[1]: Starting dracut-cmdline-ask.service... Dec 13 14:13:36.976395 kernel: audit: type=1130 audit(1734099216.969:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:36.976430 systemd-journald[309]: Journal started Dec 13 14:13:36.976540 systemd-journald[309]: Runtime Journal (/run/log/journal/ec28ed73cc71766accb02036a46392d7) is 8.0M, max 75.4M, 67.4M free. Dec 13 14:13:36.943000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:36.957000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:36.969000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:36.942656 systemd-modules-load[310]: Inserted module 'overlay' Dec 13 14:13:36.999479 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 14:13:37.023638 systemd[1]: Started systemd-journald.service. Dec 13 14:13:37.023702 kernel: audit: type=1130 audit(1734099217.014:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:37.014000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:37.024297 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 14:13:37.023000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:37.036478 kernel: audit: type=1130 audit(1734099217.023:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:37.042881 systemd[1]: Finished dracut-cmdline-ask.service. Dec 13 14:13:37.043000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:37.046308 systemd[1]: Starting dracut-cmdline.service... Dec 13 14:13:37.063890 systemd-resolved[311]: Positive Trust Anchors: Dec 13 14:13:37.066967 kernel: audit: type=1130 audit(1734099217.043:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:37.067005 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Dec 13 14:13:37.064244 systemd-resolved[311]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 14:13:37.064300 systemd-resolved[311]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 14:13:37.108044 kernel: Bridge firewalling registered Dec 13 14:13:37.085053 systemd-modules-load[310]: Inserted module 'br_netfilter' Dec 13 14:13:37.122246 dracut-cmdline[326]: dracut-dracut-053 Dec 13 14:13:37.131574 kernel: SCSI subsystem initialized Dec 13 14:13:37.131650 dracut-cmdline[326]: Using kernel command line parameters: rd.driver.pre=btrfs BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlycon flatcar.first_boot=detected acpi=force flatcar.oem.id=ec2 modprobe.blacklist=xen_fbfront net.ifnames=0 nvme_core.io_timeout=4294967295 verity.usrhash=5997a8cf94b1df1856dc785f0a7074604bbf4c21fdcca24a1996021471a77601 Dec 13 14:13:37.161186 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Dec 13 14:13:37.161227 kernel: device-mapper: uevent: version 1.0.3 Dec 13 14:13:37.164968 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Dec 13 14:13:37.172490 systemd-modules-load[310]: Inserted module 'dm_multipath' Dec 13 14:13:37.174919 systemd[1]: Finished systemd-modules-load.service. Dec 13 14:13:37.191828 kernel: audit: type=1130 audit(1734099217.173:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:37.173000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:37.191107 systemd[1]: Starting systemd-sysctl.service... Dec 13 14:13:37.213881 systemd[1]: Finished systemd-sysctl.service. Dec 13 14:13:37.214000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:37.224780 kernel: audit: type=1130 audit(1734099217.214:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:37.303453 kernel: Loading iSCSI transport class v2.0-870. Dec 13 14:13:37.324457 kernel: iscsi: registered transport (tcp) Dec 13 14:13:37.351073 kernel: iscsi: registered transport (qla4xxx) Dec 13 14:13:37.351154 kernel: QLogic iSCSI HBA Driver Dec 13 14:13:37.525966 systemd-resolved[311]: Defaulting to hostname 'linux'. Dec 13 14:13:37.528506 kernel: random: crng init done Dec 13 14:13:37.529150 systemd[1]: Started systemd-resolved.service. Dec 13 14:13:37.541079 kernel: audit: type=1130 audit(1734099217.529:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:37.529000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:37.531278 systemd[1]: Reached target nss-lookup.target. Dec 13 14:13:37.559577 systemd[1]: Finished dracut-cmdline.service. Dec 13 14:13:37.560000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:37.563961 systemd[1]: Starting dracut-pre-udev.service... Dec 13 14:13:37.627462 kernel: raid6: neonx8 gen() 6341 MB/s Dec 13 14:13:37.645449 kernel: raid6: neonx8 xor() 4795 MB/s Dec 13 14:13:37.663448 kernel: raid6: neonx4 gen() 6446 MB/s Dec 13 14:13:37.681447 kernel: raid6: neonx4 xor() 5005 MB/s Dec 13 14:13:37.699448 kernel: raid6: neonx2 gen() 5704 MB/s Dec 13 14:13:37.717447 kernel: raid6: neonx2 xor() 4582 MB/s Dec 13 14:13:37.735447 kernel: raid6: neonx1 gen() 4434 MB/s Dec 13 14:13:37.753448 kernel: raid6: neonx1 xor() 3702 MB/s Dec 13 14:13:37.771448 kernel: raid6: int64x8 gen() 3399 MB/s Dec 13 14:13:37.789448 kernel: raid6: int64x8 xor() 2093 MB/s Dec 13 14:13:37.807451 kernel: raid6: int64x4 gen() 3767 MB/s Dec 13 14:13:37.825447 kernel: raid6: int64x4 xor() 2197 MB/s Dec 13 14:13:37.843446 kernel: raid6: int64x2 gen() 3555 MB/s Dec 13 14:13:37.861447 kernel: raid6: int64x2 xor() 1948 MB/s Dec 13 14:13:37.879446 kernel: raid6: int64x1 gen() 2752 MB/s Dec 13 14:13:37.898565 kernel: raid6: int64x1 xor() 1453 MB/s Dec 13 14:13:37.898595 kernel: raid6: using algorithm neonx4 gen() 6446 MB/s Dec 13 14:13:37.898619 kernel: raid6: .... xor() 5005 MB/s, rmw enabled Dec 13 14:13:37.900175 kernel: raid6: using neon recovery algorithm Dec 13 14:13:37.919778 kernel: xor: measuring software checksum speed Dec 13 14:13:37.919839 kernel: 8regs : 9299 MB/sec Dec 13 14:13:37.921531 kernel: 32regs : 11102 MB/sec Dec 13 14:13:37.923344 kernel: arm64_neon : 9384 MB/sec Dec 13 14:13:37.923373 kernel: xor: using function: 32regs (11102 MB/sec) Dec 13 14:13:38.014472 kernel: Btrfs loaded, crc32c=crc32c-generic, zoned=no, fsverity=no Dec 13 14:13:38.031901 systemd[1]: Finished dracut-pre-udev.service. Dec 13 14:13:38.032000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:38.033000 audit: BPF prog-id=7 op=LOAD Dec 13 14:13:38.033000 audit: BPF prog-id=8 op=LOAD Dec 13 14:13:38.036740 systemd[1]: Starting systemd-udevd.service... Dec 13 14:13:38.063860 systemd-udevd[509]: Using default interface naming scheme 'v252'. Dec 13 14:13:38.073711 systemd[1]: Started systemd-udevd.service. Dec 13 14:13:38.078000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:38.082182 systemd[1]: Starting dracut-pre-trigger.service... Dec 13 14:13:38.112751 dracut-pre-trigger[521]: rd.md=0: removing MD RAID activation Dec 13 14:13:38.173582 systemd[1]: Finished dracut-pre-trigger.service. Dec 13 14:13:38.175000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:38.177956 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 14:13:38.280248 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 14:13:38.281000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:38.383461 kernel: ACPI: \_SB_.PCI0.GSI1: Enabled at IRQ 36 Dec 13 14:13:38.383525 kernel: ena 0000:00:05.0: enabling device (0010 -> 0012) Dec 13 14:13:38.404949 kernel: ena 0000:00:05.0: ENA device version: 0.10 Dec 13 14:13:38.405168 kernel: ena 0000:00:05.0: ENA controller version: 0.0.1 implementation version 1 Dec 13 14:13:38.405373 kernel: ena 0000:00:05.0: Elastic Network Adapter (ENA) found at mem 80114000, mac addr 06:8d:52:1d:66:d7 Dec 13 14:13:38.408874 (udev-worker)[560]: Network interface NamePolicy= disabled on kernel command line. Dec 13 14:13:38.417450 kernel: ACPI: \_SB_.PCI0.GSI0: Enabled at IRQ 35 Dec 13 14:13:38.420177 kernel: nvme nvme0: pci function 0000:00:04.0 Dec 13 14:13:38.428454 kernel: nvme nvme0: 2/0/0 default/read/poll queues Dec 13 14:13:38.436337 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Dec 13 14:13:38.436391 kernel: GPT:9289727 != 16777215 Dec 13 14:13:38.438379 kernel: GPT:Alternate GPT header not at the end of the disk. Dec 13 14:13:38.439585 kernel: GPT:9289727 != 16777215 Dec 13 14:13:38.441302 kernel: GPT: Use GNU Parted to correct GPT errors. Dec 13 14:13:38.442750 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Dec 13 14:13:38.512457 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/nvme0n1p6 scanned by (udev-worker) (569) Dec 13 14:13:38.574274 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Dec 13 14:13:38.617848 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 14:13:38.630737 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Dec 13 14:13:38.634499 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Dec 13 14:13:38.658336 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Dec 13 14:13:38.663517 systemd[1]: Starting disk-uuid.service... Dec 13 14:13:38.674079 disk-uuid[671]: Primary Header is updated. Dec 13 14:13:38.674079 disk-uuid[671]: Secondary Entries is updated. Dec 13 14:13:38.674079 disk-uuid[671]: Secondary Header is updated. Dec 13 14:13:38.681467 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Dec 13 14:13:38.690454 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Dec 13 14:13:38.698459 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Dec 13 14:13:39.701457 kernel: nvme0n1: p1 p2 p3 p4 p6 p7 p9 Dec 13 14:13:39.702208 disk-uuid[672]: The operation has completed successfully. Dec 13 14:13:39.864288 systemd[1]: disk-uuid.service: Deactivated successfully. Dec 13 14:13:39.864889 systemd[1]: Finished disk-uuid.service. Dec 13 14:13:39.866000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:39.867000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:39.890043 systemd[1]: Starting verity-setup.service... Dec 13 14:13:39.915474 kernel: device-mapper: verity: sha256 using implementation "sha256-ce" Dec 13 14:13:40.009050 systemd[1]: Found device dev-mapper-usr.device. Dec 13 14:13:40.014614 systemd[1]: Mounting sysusr-usr.mount... Dec 13 14:13:40.020360 systemd[1]: Finished verity-setup.service. Dec 13 14:13:40.021000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:40.119463 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Dec 13 14:13:40.120582 systemd[1]: Mounted sysusr-usr.mount. Dec 13 14:13:40.123285 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Dec 13 14:13:40.127072 systemd[1]: Starting ignition-setup.service... Dec 13 14:13:40.132297 systemd[1]: Starting parse-ip-for-networkd.service... Dec 13 14:13:40.167308 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-generic) checksum algorithm Dec 13 14:13:40.167382 kernel: BTRFS info (device nvme0n1p6): using free space tree Dec 13 14:13:40.167407 kernel: BTRFS info (device nvme0n1p6): has skinny extents Dec 13 14:13:40.180647 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Dec 13 14:13:40.203297 systemd[1]: mnt-oem.mount: Deactivated successfully. Dec 13 14:13:40.219384 systemd[1]: Finished ignition-setup.service. Dec 13 14:13:40.219000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:40.222540 systemd[1]: Starting ignition-fetch-offline.service... Dec 13 14:13:40.284014 systemd[1]: Finished parse-ip-for-networkd.service. Dec 13 14:13:40.286000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:40.287000 audit: BPF prog-id=9 op=LOAD Dec 13 14:13:40.289668 systemd[1]: Starting systemd-networkd.service... Dec 13 14:13:40.337664 systemd-networkd[1184]: lo: Link UP Dec 13 14:13:40.337687 systemd-networkd[1184]: lo: Gained carrier Dec 13 14:13:40.341561 systemd-networkd[1184]: Enumeration completed Dec 13 14:13:40.342987 systemd[1]: Started systemd-networkd.service. Dec 13 14:13:40.345000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:40.346344 systemd[1]: Reached target network.target. Dec 13 14:13:40.348004 systemd-networkd[1184]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 14:13:40.349448 systemd[1]: Starting iscsiuio.service... Dec 13 14:13:40.361674 systemd[1]: Started iscsiuio.service. Dec 13 14:13:40.362000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:40.365793 systemd[1]: Starting iscsid.service... Dec 13 14:13:40.376471 iscsid[1189]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Dec 13 14:13:40.376471 iscsid[1189]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Dec 13 14:13:40.376471 iscsid[1189]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Dec 13 14:13:40.376471 iscsid[1189]: If using hardware iscsi like qla4xxx this message can be ignored. Dec 13 14:13:40.376471 iscsid[1189]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Dec 13 14:13:40.376471 iscsid[1189]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Dec 13 14:13:40.406000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:40.380847 systemd-networkd[1184]: eth0: Link UP Dec 13 14:13:40.380856 systemd-networkd[1184]: eth0: Gained carrier Dec 13 14:13:40.398035 systemd[1]: Started iscsid.service. Dec 13 14:13:40.413556 systemd[1]: Starting dracut-initqueue.service... Dec 13 14:13:40.418608 systemd-networkd[1184]: eth0: DHCPv4 address 172.31.18.231/20, gateway 172.31.16.1 acquired from 172.31.16.1 Dec 13 14:13:40.443640 systemd[1]: Finished dracut-initqueue.service. Dec 13 14:13:40.446591 systemd[1]: Reached target remote-fs-pre.target. Dec 13 14:13:40.449534 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 14:13:40.445000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:40.453129 systemd[1]: Reached target remote-fs.target. Dec 13 14:13:40.459151 systemd[1]: Starting dracut-pre-mount.service... Dec 13 14:13:40.477073 systemd[1]: Finished dracut-pre-mount.service. Dec 13 14:13:40.477000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:40.947367 ignition[1132]: Ignition 2.14.0 Dec 13 14:13:40.948995 ignition[1132]: Stage: fetch-offline Dec 13 14:13:40.950607 ignition[1132]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:13:40.952038 ignition[1132]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Dec 13 14:13:40.970141 ignition[1132]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Dec 13 14:13:40.971285 ignition[1132]: Ignition finished successfully Dec 13 14:13:40.975848 systemd[1]: Finished ignition-fetch-offline.service. Dec 13 14:13:40.988351 kernel: kauditd_printk_skb: 18 callbacks suppressed Dec 13 14:13:40.988394 kernel: audit: type=1130 audit(1734099220.976:29): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:40.976000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:40.979815 systemd[1]: Starting ignition-fetch.service... Dec 13 14:13:40.996086 ignition[1208]: Ignition 2.14.0 Dec 13 14:13:40.996114 ignition[1208]: Stage: fetch Dec 13 14:13:40.996399 ignition[1208]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:13:40.996523 ignition[1208]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Dec 13 14:13:41.010205 ignition[1208]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Dec 13 14:13:41.012629 ignition[1208]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Dec 13 14:13:41.025298 ignition[1208]: INFO : PUT result: OK Dec 13 14:13:41.028363 ignition[1208]: DEBUG : parsed url from cmdline: "" Dec 13 14:13:41.028363 ignition[1208]: INFO : no config URL provided Dec 13 14:13:41.028363 ignition[1208]: INFO : reading system config file "/usr/lib/ignition/user.ign" Dec 13 14:13:41.033876 ignition[1208]: INFO : no config at "/usr/lib/ignition/user.ign" Dec 13 14:13:41.033876 ignition[1208]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Dec 13 14:13:41.033876 ignition[1208]: INFO : PUT result: OK Dec 13 14:13:41.033876 ignition[1208]: INFO : GET http://169.254.169.254/2019-10-01/user-data: attempt #1 Dec 13 14:13:41.046225 ignition[1208]: INFO : GET result: OK Dec 13 14:13:41.046225 ignition[1208]: DEBUG : parsing config with SHA512: e66e7510104207911b48390587b21c222668b73a1d25222885de6a37bb75c820826d5454456df2f5b1e063e27ae7c2905682f99423c2ab4b69a6f077020a675f Dec 13 14:13:41.054973 unknown[1208]: fetched base config from "system" Dec 13 14:13:41.055215 unknown[1208]: fetched base config from "system" Dec 13 14:13:41.056367 ignition[1208]: fetch: fetch complete Dec 13 14:13:41.055231 unknown[1208]: fetched user config from "aws" Dec 13 14:13:41.056381 ignition[1208]: fetch: fetch passed Dec 13 14:13:41.056487 ignition[1208]: Ignition finished successfully Dec 13 14:13:41.066397 systemd[1]: Finished ignition-fetch.service. Dec 13 14:13:41.067000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:41.070629 systemd[1]: Starting ignition-kargs.service... Dec 13 14:13:41.079887 kernel: audit: type=1130 audit(1734099221.067:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:41.092569 ignition[1214]: Ignition 2.14.0 Dec 13 14:13:41.092598 ignition[1214]: Stage: kargs Dec 13 14:13:41.092885 ignition[1214]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:13:41.092948 ignition[1214]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Dec 13 14:13:41.107343 ignition[1214]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Dec 13 14:13:41.110000 ignition[1214]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Dec 13 14:13:41.113407 ignition[1214]: INFO : PUT result: OK Dec 13 14:13:41.118635 ignition[1214]: kargs: kargs passed Dec 13 14:13:41.118925 ignition[1214]: Ignition finished successfully Dec 13 14:13:41.122867 systemd[1]: Finished ignition-kargs.service. Dec 13 14:13:41.121000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:41.126275 systemd[1]: Starting ignition-disks.service... Dec 13 14:13:41.136444 kernel: audit: type=1130 audit(1734099221.121:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:41.141507 ignition[1220]: Ignition 2.14.0 Dec 13 14:13:41.141534 ignition[1220]: Stage: disks Dec 13 14:13:41.141846 ignition[1220]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:13:41.141903 ignition[1220]: parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Dec 13 14:13:41.154466 ignition[1220]: no config dir at "/usr/lib/ignition/base.platform.d/aws" Dec 13 14:13:41.156697 ignition[1220]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Dec 13 14:13:41.159077 ignition[1220]: INFO : PUT result: OK Dec 13 14:13:41.163760 ignition[1220]: disks: disks passed Dec 13 14:13:41.163861 ignition[1220]: Ignition finished successfully Dec 13 14:13:41.167191 systemd[1]: Finished ignition-disks.service. Dec 13 14:13:41.168000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:41.170126 systemd[1]: Reached target initrd-root-device.target. Dec 13 14:13:41.179722 kernel: audit: type=1130 audit(1734099221.168:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:41.179767 systemd[1]: Reached target local-fs-pre.target. Dec 13 14:13:41.180150 systemd[1]: Reached target local-fs.target. Dec 13 14:13:41.180801 systemd[1]: Reached target sysinit.target. Dec 13 14:13:41.181091 systemd[1]: Reached target basic.target. Dec 13 14:13:41.183713 systemd[1]: Starting systemd-fsck-root.service... Dec 13 14:13:41.230368 systemd-fsck[1228]: ROOT: clean, 621/553520 files, 56020/553472 blocks Dec 13 14:13:41.236000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:41.235803 systemd[1]: Finished systemd-fsck-root.service. Dec 13 14:13:41.247339 kernel: audit: type=1130 audit(1734099221.236:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:41.238819 systemd[1]: Mounting sysroot.mount... Dec 13 14:13:41.266460 kernel: EXT4-fs (nvme0n1p9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Dec 13 14:13:41.268161 systemd[1]: Mounted sysroot.mount. Dec 13 14:13:41.270819 systemd[1]: Reached target initrd-root-fs.target. Dec 13 14:13:41.282313 systemd[1]: Mounting sysroot-usr.mount... Dec 13 14:13:41.284411 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Dec 13 14:13:41.284510 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Dec 13 14:13:41.284563 systemd[1]: Reached target ignition-diskful.target. Dec 13 14:13:41.297673 systemd[1]: Mounted sysroot-usr.mount. Dec 13 14:13:41.319546 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 14:13:41.327318 systemd[1]: Starting initrd-setup-root.service... Dec 13 14:13:41.343700 initrd-setup-root[1250]: cut: /sysroot/etc/passwd: No such file or directory Dec 13 14:13:41.353441 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/nvme0n1p6 scanned by mount (1245) Dec 13 14:13:41.359994 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-generic) checksum algorithm Dec 13 14:13:41.360051 kernel: BTRFS info (device nvme0n1p6): using free space tree Dec 13 14:13:41.362582 kernel: BTRFS info (device nvme0n1p6): has skinny extents Dec 13 14:13:41.365579 initrd-setup-root[1272]: cut: /sysroot/etc/group: No such file or directory Dec 13 14:13:41.372873 initrd-setup-root[1282]: cut: /sysroot/etc/shadow: No such file or directory Dec 13 14:13:41.381361 initrd-setup-root[1290]: cut: /sysroot/etc/gshadow: No such file or directory Dec 13 14:13:41.395464 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Dec 13 14:13:41.406526 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 14:13:41.559819 systemd[1]: Finished initrd-setup-root.service. Dec 13 14:13:41.561000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:41.564039 systemd[1]: Starting ignition-mount.service... Dec 13 14:13:41.573096 kernel: audit: type=1130 audit(1734099221.561:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:41.573651 systemd[1]: Starting sysroot-boot.service... Dec 13 14:13:41.584684 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Dec 13 14:13:41.584859 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Dec 13 14:13:41.608721 ignition[1310]: INFO : Ignition 2.14.0 Dec 13 14:13:41.608721 ignition[1310]: INFO : Stage: mount Dec 13 14:13:41.611809 ignition[1310]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:13:41.611809 ignition[1310]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Dec 13 14:13:41.635698 systemd[1]: Finished sysroot-boot.service. Dec 13 14:13:41.637000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:41.645475 kernel: audit: type=1130 audit(1734099221.637:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:41.650139 ignition[1310]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Dec 13 14:13:41.652589 ignition[1310]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Dec 13 14:13:41.655450 ignition[1310]: INFO : PUT result: OK Dec 13 14:13:41.660287 ignition[1310]: INFO : mount: mount passed Dec 13 14:13:41.662904 ignition[1310]: INFO : Ignition finished successfully Dec 13 14:13:41.663000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:41.682021 kernel: audit: type=1130 audit(1734099221.663:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:41.662145 systemd[1]: Finished ignition-mount.service. Dec 13 14:13:41.665905 systemd[1]: Starting ignition-files.service... Dec 13 14:13:41.689798 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 14:13:41.711457 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/nvme0n1p6 scanned by mount (1320) Dec 13 14:13:41.717287 kernel: BTRFS info (device nvme0n1p6): using crc32c (crc32c-generic) checksum algorithm Dec 13 14:13:41.717333 kernel: BTRFS info (device nvme0n1p6): using free space tree Dec 13 14:13:41.717356 kernel: BTRFS info (device nvme0n1p6): has skinny extents Dec 13 14:13:41.732449 kernel: BTRFS info (device nvme0n1p6): enabling ssd optimizations Dec 13 14:13:41.738076 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 14:13:41.756600 ignition[1339]: INFO : Ignition 2.14.0 Dec 13 14:13:41.756600 ignition[1339]: INFO : Stage: files Dec 13 14:13:41.760365 ignition[1339]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:13:41.760365 ignition[1339]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Dec 13 14:13:41.772823 ignition[1339]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Dec 13 14:13:41.775404 ignition[1339]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Dec 13 14:13:41.778395 ignition[1339]: INFO : PUT result: OK Dec 13 14:13:41.783318 ignition[1339]: DEBUG : files: compiled without relabeling support, skipping Dec 13 14:13:41.788206 ignition[1339]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Dec 13 14:13:41.790733 ignition[1339]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Dec 13 14:13:41.820408 ignition[1339]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Dec 13 14:13:41.823013 ignition[1339]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Dec 13 14:13:41.825821 unknown[1339]: wrote ssh authorized keys file for user: core Dec 13 14:13:41.827933 ignition[1339]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Dec 13 14:13:41.837372 ignition[1339]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-arm64.tar.gz" Dec 13 14:13:41.840850 ignition[1339]: INFO : GET https://get.helm.sh/helm-v3.13.2-linux-arm64.tar.gz: attempt #1 Dec 13 14:13:41.954052 ignition[1339]: INFO : GET result: OK Dec 13 14:13:42.107892 ignition[1339]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-arm64.tar.gz" Dec 13 14:13:42.107892 ignition[1339]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/etc/eks/bootstrap.sh" Dec 13 14:13:42.114641 ignition[1339]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Dec 13 14:13:42.125847 ignition[1339]: INFO : op(1): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2170239446" Dec 13 14:13:42.133204 kernel: BTRFS info: devid 1 device path /dev/nvme0n1p6 changed to /dev/disk/by-label/OEM scanned by ignition (1344) Dec 13 14:13:42.133241 ignition[1339]: CRITICAL : op(1): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2170239446": device or resource busy Dec 13 14:13:42.133241 ignition[1339]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2170239446", trying btrfs: device or resource busy Dec 13 14:13:42.133241 ignition[1339]: INFO : op(2): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2170239446" Dec 13 14:13:42.143032 ignition[1339]: INFO : op(2): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2170239446" Dec 13 14:13:42.146262 ignition[1339]: INFO : op(3): [started] unmounting "/mnt/oem2170239446" Dec 13 14:13:42.148336 ignition[1339]: INFO : op(3): [finished] unmounting "/mnt/oem2170239446" Dec 13 14:13:42.148336 ignition[1339]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/eks/bootstrap.sh" Dec 13 14:13:42.153337 ignition[1339]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/install.sh" Dec 13 14:13:42.156808 ignition[1339]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/install.sh" Dec 13 14:13:42.159951 ignition[1339]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nginx.yaml" Dec 13 14:13:42.163126 ignition[1339]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nginx.yaml" Dec 13 14:13:42.166262 ignition[1339]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Dec 13 14:13:42.169390 ignition[1339]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Dec 13 14:13:42.169390 ignition[1339]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Dec 13 14:13:42.175617 ignition[1339]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Dec 13 14:13:42.175617 ignition[1339]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 14:13:42.175617 ignition[1339]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 14:13:42.175617 ignition[1339]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.29.2-arm64.raw" Dec 13 14:13:42.175617 ignition[1339]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.29.2-arm64.raw" Dec 13 14:13:42.175617 ignition[1339]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json" Dec 13 14:13:42.175617 ignition[1339]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Dec 13 14:13:42.209587 ignition[1339]: INFO : op(4): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4093318280" Dec 13 14:13:42.209587 ignition[1339]: CRITICAL : op(4): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4093318280": device or resource busy Dec 13 14:13:42.209587 ignition[1339]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem4093318280", trying btrfs: device or resource busy Dec 13 14:13:42.209587 ignition[1339]: INFO : op(5): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4093318280" Dec 13 14:13:42.209587 ignition[1339]: INFO : op(5): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4093318280" Dec 13 14:13:42.209587 ignition[1339]: INFO : op(6): [started] unmounting "/mnt/oem4093318280" Dec 13 14:13:42.209587 ignition[1339]: INFO : op(6): [finished] unmounting "/mnt/oem4093318280" Dec 13 14:13:42.209587 ignition[1339]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/etc/amazon/ssm/amazon-ssm-agent.json" Dec 13 14:13:42.209587 ignition[1339]: INFO : files: createFilesystemsFiles: createFiles: op(c): [started] writing file "/sysroot/etc/amazon/ssm/seelog.xml" Dec 13 14:13:42.209587 ignition[1339]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Dec 13 14:13:42.223542 systemd-networkd[1184]: eth0: Gained IPv6LL Dec 13 14:13:42.249290 ignition[1339]: INFO : op(7): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3124745179" Dec 13 14:13:42.249290 ignition[1339]: CRITICAL : op(7): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3124745179": device or resource busy Dec 13 14:13:42.249290 ignition[1339]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3124745179", trying btrfs: device or resource busy Dec 13 14:13:42.249290 ignition[1339]: INFO : op(8): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3124745179" Dec 13 14:13:42.249290 ignition[1339]: INFO : op(8): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3124745179" Dec 13 14:13:42.249290 ignition[1339]: INFO : op(9): [started] unmounting "/mnt/oem3124745179" Dec 13 14:13:42.249290 ignition[1339]: INFO : op(9): [finished] unmounting "/mnt/oem3124745179" Dec 13 14:13:42.249290 ignition[1339]: INFO : files: createFilesystemsFiles: createFiles: op(c): [finished] writing file "/sysroot/etc/amazon/ssm/seelog.xml" Dec 13 14:13:42.283195 ignition[1339]: INFO : files: createFilesystemsFiles: createFiles: op(d): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" Dec 13 14:13:42.283195 ignition[1339]: INFO : oem config not found in "/usr/share/oem", looking on oem partition Dec 13 14:13:42.301232 ignition[1339]: INFO : op(a): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1539408402" Dec 13 14:13:42.303908 ignition[1339]: CRITICAL : op(a): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1539408402": device or resource busy Dec 13 14:13:42.303908 ignition[1339]: ERROR : failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1539408402", trying btrfs: device or resource busy Dec 13 14:13:42.303908 ignition[1339]: INFO : op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1539408402" Dec 13 14:13:42.303908 ignition[1339]: INFO : op(b): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1539408402" Dec 13 14:13:42.320176 ignition[1339]: INFO : op(c): [started] unmounting "/mnt/oem1539408402" Dec 13 14:13:42.322292 ignition[1339]: INFO : op(c): [finished] unmounting "/mnt/oem1539408402" Dec 13 14:13:42.322292 ignition[1339]: INFO : files: createFilesystemsFiles: createFiles: op(d): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" Dec 13 14:13:42.327663 ignition[1339]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.29.2-arm64.raw" Dec 13 14:13:42.327663 ignition[1339]: INFO : GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.29.2-arm64.raw: attempt #1 Dec 13 14:13:42.335459 systemd[1]: mnt-oem1539408402.mount: Deactivated successfully. Dec 13 14:13:42.838050 ignition[1339]: INFO : GET result: OK Dec 13 14:13:43.447973 ignition[1339]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.29.2-arm64.raw" Dec 13 14:13:43.452174 ignition[1339]: INFO : files: op(f): [started] processing unit "coreos-metadata-sshkeys@.service" Dec 13 14:13:43.452174 ignition[1339]: INFO : files: op(f): [finished] processing unit "coreos-metadata-sshkeys@.service" Dec 13 14:13:43.452174 ignition[1339]: INFO : files: op(10): [started] processing unit "amazon-ssm-agent.service" Dec 13 14:13:43.452174 ignition[1339]: INFO : files: op(10): op(11): [started] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service" Dec 13 14:13:43.452174 ignition[1339]: INFO : files: op(10): op(11): [finished] writing unit "amazon-ssm-agent.service" at "/sysroot/etc/systemd/system/amazon-ssm-agent.service" Dec 13 14:13:43.452174 ignition[1339]: INFO : files: op(10): [finished] processing unit "amazon-ssm-agent.service" Dec 13 14:13:43.452174 ignition[1339]: INFO : files: op(12): [started] processing unit "nvidia.service" Dec 13 14:13:43.452174 ignition[1339]: INFO : files: op(12): [finished] processing unit "nvidia.service" Dec 13 14:13:43.452174 ignition[1339]: INFO : files: op(13): [started] processing unit "prepare-helm.service" Dec 13 14:13:43.452174 ignition[1339]: INFO : files: op(13): op(14): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Dec 13 14:13:43.452174 ignition[1339]: INFO : files: op(13): op(14): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Dec 13 14:13:43.452174 ignition[1339]: INFO : files: op(13): [finished] processing unit "prepare-helm.service" Dec 13 14:13:43.452174 ignition[1339]: INFO : files: op(15): [started] setting preset to enabled for "nvidia.service" Dec 13 14:13:43.490763 ignition[1339]: INFO : files: op(15): [finished] setting preset to enabled for "nvidia.service" Dec 13 14:13:43.490763 ignition[1339]: INFO : files: op(16): [started] setting preset to enabled for "prepare-helm.service" Dec 13 14:13:43.490763 ignition[1339]: INFO : files: op(16): [finished] setting preset to enabled for "prepare-helm.service" Dec 13 14:13:43.490763 ignition[1339]: INFO : files: op(17): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Dec 13 14:13:43.490763 ignition[1339]: INFO : files: op(17): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Dec 13 14:13:43.490763 ignition[1339]: INFO : files: op(18): [started] setting preset to enabled for "amazon-ssm-agent.service" Dec 13 14:13:43.490763 ignition[1339]: INFO : files: op(18): [finished] setting preset to enabled for "amazon-ssm-agent.service" Dec 13 14:13:43.509872 ignition[1339]: INFO : files: createResultFile: createFiles: op(19): [started] writing file "/sysroot/etc/.ignition-result.json" Dec 13 14:13:43.509872 ignition[1339]: INFO : files: createResultFile: createFiles: op(19): [finished] writing file "/sysroot/etc/.ignition-result.json" Dec 13 14:13:43.509872 ignition[1339]: INFO : files: files passed Dec 13 14:13:43.509872 ignition[1339]: INFO : Ignition finished successfully Dec 13 14:13:43.524827 systemd[1]: Finished ignition-files.service. Dec 13 14:13:43.526000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:43.535126 systemd[1]: Starting initrd-setup-root-after-ignition.service... Dec 13 14:13:43.537760 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Dec 13 14:13:43.559056 kernel: audit: type=1130 audit(1734099223.526:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:43.559562 systemd[1]: Starting ignition-quench.service... Dec 13 14:13:43.568207 systemd[1]: ignition-quench.service: Deactivated successfully. Dec 13 14:13:43.570143 systemd[1]: Finished ignition-quench.service. Dec 13 14:13:43.571000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:43.575082 initrd-setup-root-after-ignition[1364]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Dec 13 14:13:43.582951 kernel: audit: type=1130 audit(1734099223.571:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:43.579000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:43.581228 systemd[1]: Finished initrd-setup-root-after-ignition.service. Dec 13 14:13:43.586832 systemd[1]: Reached target ignition-complete.target. Dec 13 14:13:43.603106 systemd[1]: Starting initrd-parse-etc.service... Dec 13 14:13:43.585000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:43.632034 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Dec 13 14:13:43.632409 systemd[1]: Finished initrd-parse-etc.service. Dec 13 14:13:43.634000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:43.635000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:43.637370 systemd[1]: Reached target initrd-fs.target. Dec 13 14:13:43.638942 systemd[1]: Reached target initrd.target. Dec 13 14:13:43.643061 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Dec 13 14:13:43.646873 systemd[1]: Starting dracut-pre-pivot.service... Dec 13 14:13:43.669374 systemd[1]: Finished dracut-pre-pivot.service. Dec 13 14:13:43.669000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:43.673676 systemd[1]: Starting initrd-cleanup.service... Dec 13 14:13:43.695009 systemd[1]: Stopped target nss-lookup.target. Dec 13 14:13:43.698281 systemd[1]: Stopped target remote-cryptsetup.target. Dec 13 14:13:43.701733 systemd[1]: Stopped target timers.target. Dec 13 14:13:43.704615 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Dec 13 14:13:43.705303 systemd[1]: Stopped dracut-pre-pivot.service. Dec 13 14:13:43.709531 systemd[1]: Stopped target initrd.target. Dec 13 14:13:43.707000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:43.712447 systemd[1]: Stopped target basic.target. Dec 13 14:13:43.717994 systemd[1]: Stopped target ignition-complete.target. Dec 13 14:13:43.721112 systemd[1]: Stopped target ignition-diskful.target. Dec 13 14:13:43.724391 systemd[1]: Stopped target initrd-root-device.target. Dec 13 14:13:43.727793 systemd[1]: Stopped target remote-fs.target. Dec 13 14:13:43.730705 systemd[1]: Stopped target remote-fs-pre.target. Dec 13 14:13:43.733828 systemd[1]: Stopped target sysinit.target. Dec 13 14:13:43.736611 systemd[1]: Stopped target local-fs.target. Dec 13 14:13:43.742060 systemd[1]: Stopped target local-fs-pre.target. Dec 13 14:13:43.745139 systemd[1]: Stopped target swap.target. Dec 13 14:13:43.747773 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Dec 13 14:13:43.749723 systemd[1]: Stopped dracut-pre-mount.service. Dec 13 14:13:43.751000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:43.752722 systemd[1]: Stopped target cryptsetup.target. Dec 13 14:13:43.755696 systemd[1]: dracut-initqueue.service: Deactivated successfully. Dec 13 14:13:43.757657 systemd[1]: Stopped dracut-initqueue.service. Dec 13 14:13:43.759000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:43.760694 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Dec 13 14:13:43.762867 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Dec 13 14:13:43.764000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:43.766501 systemd[1]: ignition-files.service: Deactivated successfully. Dec 13 14:13:43.768366 systemd[1]: Stopped ignition-files.service. Dec 13 14:13:43.769000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:43.772889 systemd[1]: Stopping ignition-mount.service... Dec 13 14:13:43.787593 ignition[1377]: INFO : Ignition 2.14.0 Dec 13 14:13:43.787593 ignition[1377]: INFO : Stage: umount Dec 13 14:13:43.787593 ignition[1377]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:13:43.787593 ignition[1377]: DEBUG : parsing config with SHA512: 6629d8e825d60c9c9d4629d8547ef9a0b839d6b01b7f61a481a1f23308c924b8b0bbf10cae7f7fe3bcaf88b23d1a81baa7771c3670728d4d2a1e665216a1de7b Dec 13 14:13:43.800915 systemd[1]: Stopping iscsiuio.service... Dec 13 14:13:43.806250 systemd[1]: Stopping sysroot-boot.service... Dec 13 14:13:43.807684 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Dec 13 14:13:43.811991 systemd[1]: Stopped systemd-udev-trigger.service. Dec 13 14:13:43.819947 ignition[1377]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/aws" Dec 13 14:13:43.819947 ignition[1377]: INFO : PUT http://169.254.169.254/latest/api/token: attempt #1 Dec 13 14:13:43.825000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:43.826899 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Dec 13 14:13:43.827128 systemd[1]: Stopped dracut-pre-trigger.service. Dec 13 14:13:43.833000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:43.836630 ignition[1377]: INFO : PUT result: OK Dec 13 14:13:43.842620 systemd[1]: sysroot-boot.mount: Deactivated successfully. Dec 13 14:13:43.845471 systemd[1]: iscsiuio.service: Deactivated successfully. Dec 13 14:13:43.847207 systemd[1]: Stopped iscsiuio.service. Dec 13 14:13:43.849907 ignition[1377]: INFO : umount: umount passed Dec 13 14:13:43.851509 ignition[1377]: INFO : Ignition finished successfully Dec 13 14:13:43.852000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:43.855275 systemd[1]: ignition-mount.service: Deactivated successfully. Dec 13 14:13:43.857125 systemd[1]: Stopped ignition-mount.service. Dec 13 14:13:43.860000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:43.863152 systemd[1]: sysroot-boot.service: Deactivated successfully. Dec 13 14:13:43.863379 systemd[1]: Stopped sysroot-boot.service. Dec 13 14:13:43.863000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:43.867062 systemd[1]: initrd-cleanup.service: Deactivated successfully. Dec 13 14:13:43.868000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:43.868000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:43.871000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:43.867270 systemd[1]: Finished initrd-cleanup.service. Dec 13 14:13:43.874000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:43.871083 systemd[1]: ignition-disks.service: Deactivated successfully. Dec 13 14:13:43.877000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:43.871182 systemd[1]: Stopped ignition-disks.service. Dec 13 14:13:43.882000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:43.872838 systemd[1]: ignition-kargs.service: Deactivated successfully. Dec 13 14:13:43.873042 systemd[1]: Stopped ignition-kargs.service. Dec 13 14:13:43.876017 systemd[1]: ignition-fetch.service: Deactivated successfully. Dec 13 14:13:43.876101 systemd[1]: Stopped ignition-fetch.service. Dec 13 14:13:43.879290 systemd[1]: Stopped target network.target. Dec 13 14:13:43.882012 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Dec 13 14:13:43.882096 systemd[1]: Stopped ignition-fetch-offline.service. Dec 13 14:13:43.883901 systemd[1]: Stopped target paths.target. Dec 13 14:13:43.886310 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Dec 13 14:13:43.898459 systemd[1]: Stopped systemd-ask-password-console.path. Dec 13 14:13:43.903292 systemd[1]: Stopped target slices.target. Dec 13 14:13:43.908000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:43.913000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:43.904614 systemd[1]: Stopped target sockets.target. Dec 13 14:13:43.906058 systemd[1]: iscsid.socket: Deactivated successfully. Dec 13 14:13:43.906114 systemd[1]: Closed iscsid.socket. Dec 13 14:13:43.907378 systemd[1]: iscsiuio.socket: Deactivated successfully. Dec 13 14:13:43.907467 systemd[1]: Closed iscsiuio.socket. Dec 13 14:13:43.908730 systemd[1]: ignition-setup.service: Deactivated successfully. Dec 13 14:13:43.908812 systemd[1]: Stopped ignition-setup.service. Dec 13 14:13:43.934000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:43.910269 systemd[1]: initrd-setup-root.service: Deactivated successfully. Dec 13 14:13:43.910343 systemd[1]: Stopped initrd-setup-root.service. Dec 13 14:13:43.915954 systemd[1]: Stopping systemd-networkd.service... Dec 13 14:13:43.918767 systemd[1]: Stopping systemd-resolved.service... Dec 13 14:13:43.948000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:43.926467 systemd-networkd[1184]: eth0: DHCPv6 lease lost Dec 13 14:13:43.948000 audit: BPF prog-id=9 op=UNLOAD Dec 13 14:13:43.949000 audit: BPF prog-id=6 op=UNLOAD Dec 13 14:13:43.931552 systemd[1]: systemd-networkd.service: Deactivated successfully. Dec 13 14:13:43.933486 systemd[1]: Stopped systemd-networkd.service. Dec 13 14:13:43.957000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:43.962000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:43.937707 systemd[1]: systemd-resolved.service: Deactivated successfully. Dec 13 14:13:43.965000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:43.942323 systemd[1]: Stopped systemd-resolved.service. Dec 13 14:13:43.951059 systemd[1]: systemd-networkd.socket: Deactivated successfully. Dec 13 14:13:43.951129 systemd[1]: Closed systemd-networkd.socket. Dec 13 14:13:43.955515 systemd[1]: Stopping network-cleanup.service... Dec 13 14:13:43.956962 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Dec 13 14:13:43.957078 systemd[1]: Stopped parse-ip-for-networkd.service. Dec 13 14:13:43.959555 systemd[1]: systemd-sysctl.service: Deactivated successfully. Dec 13 14:13:43.959654 systemd[1]: Stopped systemd-sysctl.service. Dec 13 14:13:43.964973 systemd[1]: systemd-modules-load.service: Deactivated successfully. Dec 13 14:13:43.965065 systemd[1]: Stopped systemd-modules-load.service. Dec 13 14:13:43.972574 systemd[1]: Stopping systemd-udevd.service... Dec 13 14:13:43.994777 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Dec 13 14:13:44.013025 systemd[1]: network-cleanup.service: Deactivated successfully. Dec 13 14:13:44.013447 systemd[1]: Stopped network-cleanup.service. Dec 13 14:13:44.017000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:44.018756 systemd[1]: systemd-udevd.service: Deactivated successfully. Dec 13 14:13:44.019178 systemd[1]: Stopped systemd-udevd.service. Dec 13 14:13:44.022000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:44.024599 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Dec 13 14:13:44.024806 systemd[1]: Closed systemd-udevd-control.socket. Dec 13 14:13:44.030106 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Dec 13 14:13:44.030279 systemd[1]: Closed systemd-udevd-kernel.socket. Dec 13 14:13:44.035221 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Dec 13 14:13:44.035402 systemd[1]: Stopped dracut-pre-udev.service. Dec 13 14:13:44.038000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:44.040385 systemd[1]: dracut-cmdline.service: Deactivated successfully. Dec 13 14:13:44.041265 systemd[1]: Stopped dracut-cmdline.service. Dec 13 14:13:44.045016 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Dec 13 14:13:44.043000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:44.048000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:44.045099 systemd[1]: Stopped dracut-cmdline-ask.service. Dec 13 14:13:44.060914 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Dec 13 14:13:44.064245 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Dec 13 14:13:44.065101 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Dec 13 14:13:44.068000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:44.069833 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Dec 13 14:13:44.071729 systemd[1]: Stopped kmod-static-nodes.service. Dec 13 14:13:44.074845 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Dec 13 14:13:44.075044 systemd[1]: Stopped systemd-vconsole-setup.service. Dec 13 14:13:44.073000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:44.078000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:44.082215 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Dec 13 14:13:44.095313 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Dec 13 14:13:44.097348 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Dec 13 14:13:44.103000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:44.103000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:44.104445 systemd[1]: Reached target initrd-switch-root.target. Dec 13 14:13:44.108964 systemd[1]: Starting initrd-switch-root.service... Dec 13 14:13:44.126281 systemd[1]: Switching root. Dec 13 14:13:44.158384 iscsid[1189]: iscsid shutting down. Dec 13 14:13:44.159919 systemd-journald[309]: Received SIGTERM from PID 1 (systemd). Dec 13 14:13:44.159994 systemd-journald[309]: Journal stopped Dec 13 14:13:49.682985 kernel: SELinux: Class mctp_socket not defined in policy. Dec 13 14:13:49.683102 kernel: SELinux: Class anon_inode not defined in policy. Dec 13 14:13:49.683135 kernel: SELinux: the above unknown classes and permissions will be allowed Dec 13 14:13:49.683168 kernel: SELinux: policy capability network_peer_controls=1 Dec 13 14:13:49.683206 kernel: SELinux: policy capability open_perms=1 Dec 13 14:13:49.683238 kernel: SELinux: policy capability extended_socket_class=1 Dec 13 14:13:49.683278 kernel: SELinux: policy capability always_check_network=0 Dec 13 14:13:49.683308 kernel: SELinux: policy capability cgroup_seclabel=1 Dec 13 14:13:49.683345 kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 13 14:13:49.683378 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Dec 13 14:13:49.683411 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Dec 13 14:13:49.684998 systemd[1]: Successfully loaded SELinux policy in 111.617ms. Dec 13 14:13:49.685059 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 27.987ms. Dec 13 14:13:49.685095 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 14:13:49.685128 systemd[1]: Detected virtualization amazon. Dec 13 14:13:49.685164 systemd[1]: Detected architecture arm64. Dec 13 14:13:49.685201 systemd[1]: Detected first boot. Dec 13 14:13:49.685233 systemd[1]: Initializing machine ID from VM UUID. Dec 13 14:13:49.685294 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Dec 13 14:13:49.685331 systemd[1]: Populated /etc with preset unit settings. Dec 13 14:13:49.685365 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:13:49.685407 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:13:49.685463 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:13:49.685500 kernel: kauditd_printk_skb: 56 callbacks suppressed Dec 13 14:13:49.685532 kernel: audit: type=1334 audit(1734099229.293:88): prog-id=12 op=LOAD Dec 13 14:13:49.685564 kernel: audit: type=1334 audit(1734099229.293:89): prog-id=3 op=UNLOAD Dec 13 14:13:49.685592 kernel: audit: type=1334 audit(1734099229.295:90): prog-id=13 op=LOAD Dec 13 14:13:49.685624 kernel: audit: type=1334 audit(1734099229.297:91): prog-id=14 op=LOAD Dec 13 14:13:49.685653 kernel: audit: type=1334 audit(1734099229.297:92): prog-id=4 op=UNLOAD Dec 13 14:13:49.685684 kernel: audit: type=1334 audit(1734099229.297:93): prog-id=5 op=UNLOAD Dec 13 14:13:49.685714 kernel: audit: type=1334 audit(1734099229.300:94): prog-id=15 op=LOAD Dec 13 14:13:49.685749 systemd[1]: iscsid.service: Deactivated successfully. Dec 13 14:13:49.685780 kernel: audit: type=1334 audit(1734099229.300:95): prog-id=12 op=UNLOAD Dec 13 14:13:49.685818 systemd[1]: Stopped iscsid.service. Dec 13 14:13:49.685847 kernel: audit: type=1334 audit(1734099229.302:96): prog-id=16 op=LOAD Dec 13 14:13:49.685876 kernel: audit: type=1334 audit(1734099229.304:97): prog-id=17 op=LOAD Dec 13 14:13:49.685906 systemd[1]: initrd-switch-root.service: Deactivated successfully. Dec 13 14:13:49.685936 systemd[1]: Stopped initrd-switch-root.service. Dec 13 14:13:49.685967 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Dec 13 14:13:49.685997 systemd[1]: Created slice system-addon\x2dconfig.slice. Dec 13 14:13:49.686032 systemd[1]: Created slice system-addon\x2drun.slice. Dec 13 14:13:49.686065 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Dec 13 14:13:49.686099 systemd[1]: Created slice system-getty.slice. Dec 13 14:13:49.686131 systemd[1]: Created slice system-modprobe.slice. Dec 13 14:13:49.686162 systemd[1]: Created slice system-serial\x2dgetty.slice. Dec 13 14:13:49.686193 systemd[1]: Created slice system-system\x2dcloudinit.slice. Dec 13 14:13:49.686225 systemd[1]: Created slice system-systemd\x2dfsck.slice. Dec 13 14:13:49.686255 systemd[1]: Created slice user.slice. Dec 13 14:13:49.686288 systemd[1]: Started systemd-ask-password-console.path. Dec 13 14:13:49.686319 systemd[1]: Started systemd-ask-password-wall.path. Dec 13 14:13:49.686351 systemd[1]: Set up automount boot.automount. Dec 13 14:13:49.686382 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Dec 13 14:13:49.686413 systemd[1]: Stopped target initrd-switch-root.target. Dec 13 14:13:49.686462 systemd[1]: Stopped target initrd-fs.target. Dec 13 14:13:49.686492 systemd[1]: Stopped target initrd-root-fs.target. Dec 13 14:13:49.686524 systemd[1]: Reached target integritysetup.target. Dec 13 14:13:49.686557 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 14:13:49.691958 systemd[1]: Reached target remote-fs.target. Dec 13 14:13:49.692006 systemd[1]: Reached target slices.target. Dec 13 14:13:49.692039 systemd[1]: Reached target swap.target. Dec 13 14:13:49.692069 systemd[1]: Reached target torcx.target. Dec 13 14:13:49.692101 systemd[1]: Reached target veritysetup.target. Dec 13 14:13:49.692132 systemd[1]: Listening on systemd-coredump.socket. Dec 13 14:13:49.692164 systemd[1]: Listening on systemd-initctl.socket. Dec 13 14:13:49.692195 systemd[1]: Listening on systemd-networkd.socket. Dec 13 14:13:49.692224 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 14:13:49.692256 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 14:13:49.692289 systemd[1]: Listening on systemd-userdbd.socket. Dec 13 14:13:49.692319 systemd[1]: Mounting dev-hugepages.mount... Dec 13 14:13:49.692348 systemd[1]: Mounting dev-mqueue.mount... Dec 13 14:13:49.692377 systemd[1]: Mounting media.mount... Dec 13 14:13:49.692406 systemd[1]: Mounting sys-kernel-debug.mount... Dec 13 14:13:49.693163 systemd[1]: Mounting sys-kernel-tracing.mount... Dec 13 14:13:49.693199 systemd[1]: Mounting tmp.mount... Dec 13 14:13:49.693239 systemd[1]: Starting flatcar-tmpfiles.service... Dec 13 14:13:49.693272 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:13:49.693307 systemd[1]: Starting kmod-static-nodes.service... Dec 13 14:13:49.693339 systemd[1]: Starting modprobe@configfs.service... Dec 13 14:13:49.693371 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:13:49.693403 systemd[1]: Starting modprobe@drm.service... Dec 13 14:13:49.693455 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:13:49.693487 systemd[1]: Starting modprobe@fuse.service... Dec 13 14:13:49.693518 systemd[1]: Starting modprobe@loop.service... Dec 13 14:13:49.693550 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Dec 13 14:13:49.693582 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Dec 13 14:13:49.695764 systemd[1]: Stopped systemd-fsck-root.service. Dec 13 14:13:49.695825 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Dec 13 14:13:49.695856 systemd[1]: Stopped systemd-fsck-usr.service. Dec 13 14:13:49.695891 systemd[1]: Stopped systemd-journald.service. Dec 13 14:13:49.695922 systemd[1]: Starting systemd-journald.service... Dec 13 14:13:49.695951 kernel: fuse: init (API version 7.34) Dec 13 14:13:49.695980 kernel: loop: module loaded Dec 13 14:13:49.696009 systemd[1]: Starting systemd-modules-load.service... Dec 13 14:13:49.696039 systemd[1]: Starting systemd-network-generator.service... Dec 13 14:13:49.696077 systemd[1]: Starting systemd-remount-fs.service... Dec 13 14:13:49.696107 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 14:13:49.696141 systemd[1]: verity-setup.service: Deactivated successfully. Dec 13 14:13:49.696172 systemd[1]: Stopped verity-setup.service. Dec 13 14:13:49.696203 systemd[1]: Mounted dev-hugepages.mount. Dec 13 14:13:49.696233 systemd[1]: Mounted dev-mqueue.mount. Dec 13 14:13:49.696262 systemd[1]: Mounted media.mount. Dec 13 14:13:49.696292 systemd[1]: Mounted sys-kernel-debug.mount. Dec 13 14:13:49.696324 systemd[1]: Mounted sys-kernel-tracing.mount. Dec 13 14:13:49.696358 systemd[1]: Mounted tmp.mount. Dec 13 14:13:49.696388 systemd[1]: Finished kmod-static-nodes.service. Dec 13 14:13:49.696447 systemd[1]: modprobe@configfs.service: Deactivated successfully. Dec 13 14:13:49.696485 systemd[1]: Finished modprobe@configfs.service. Dec 13 14:13:49.696515 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:13:49.696549 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:13:49.696580 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 14:13:49.696610 systemd[1]: Finished modprobe@drm.service. Dec 13 14:13:49.696640 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:13:49.696674 systemd-journald[1486]: Journal started Dec 13 14:13:49.696772 systemd-journald[1486]: Runtime Journal (/run/log/journal/ec28ed73cc71766accb02036a46392d7) is 8.0M, max 75.4M, 67.4M free. Dec 13 14:13:44.975000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Dec 13 14:13:45.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 14:13:45.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 14:13:45.145000 audit: BPF prog-id=10 op=LOAD Dec 13 14:13:45.145000 audit: BPF prog-id=10 op=UNLOAD Dec 13 14:13:45.145000 audit: BPF prog-id=11 op=LOAD Dec 13 14:13:45.145000 audit: BPF prog-id=11 op=UNLOAD Dec 13 14:13:45.355000 audit[1410]: AVC avc: denied { associate } for pid=1410 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Dec 13 14:13:45.355000 audit[1410]: SYSCALL arch=c00000b7 syscall=5 success=yes exit=0 a0=40001458ac a1=40000c6de0 a2=40000cd0c0 a3=32 items=0 ppid=1393 pid=1410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:13:45.355000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 14:13:45.359000 audit[1410]: AVC avc: denied { associate } for pid=1410 comm="torcx-generator" name="lib" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Dec 13 14:13:45.359000 audit[1410]: SYSCALL arch=c00000b7 syscall=34 success=yes exit=0 a0=ffffffffffffff9c a1=4000145985 a2=1ed a3=0 items=2 ppid=1393 pid=1410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:13:45.359000 audit: CWD cwd="/" Dec 13 14:13:45.359000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:13:45.359000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:13:45.359000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 14:13:49.293000 audit: BPF prog-id=12 op=LOAD Dec 13 14:13:49.293000 audit: BPF prog-id=3 op=UNLOAD Dec 13 14:13:49.295000 audit: BPF prog-id=13 op=LOAD Dec 13 14:13:49.297000 audit: BPF prog-id=14 op=LOAD Dec 13 14:13:49.297000 audit: BPF prog-id=4 op=UNLOAD Dec 13 14:13:49.297000 audit: BPF prog-id=5 op=UNLOAD Dec 13 14:13:49.300000 audit: BPF prog-id=15 op=LOAD Dec 13 14:13:49.300000 audit: BPF prog-id=12 op=UNLOAD Dec 13 14:13:49.302000 audit: BPF prog-id=16 op=LOAD Dec 13 14:13:49.304000 audit: BPF prog-id=17 op=LOAD Dec 13 14:13:49.304000 audit: BPF prog-id=13 op=UNLOAD Dec 13 14:13:49.304000 audit: BPF prog-id=14 op=UNLOAD Dec 13 14:13:49.307000 audit: BPF prog-id=18 op=LOAD Dec 13 14:13:49.307000 audit: BPF prog-id=15 op=UNLOAD Dec 13 14:13:49.309000 audit: BPF prog-id=19 op=LOAD Dec 13 14:13:49.311000 audit: BPF prog-id=20 op=LOAD Dec 13 14:13:49.311000 audit: BPF prog-id=16 op=UNLOAD Dec 13 14:13:49.311000 audit: BPF prog-id=17 op=UNLOAD Dec 13 14:13:49.313000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:49.325000 audit: BPF prog-id=18 op=UNLOAD Dec 13 14:13:49.326000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:49.704214 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:13:49.333000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:49.333000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:49.574000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:49.580000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:49.709224 systemd[1]: Started systemd-journald.service. Dec 13 14:13:49.583000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:49.583000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:49.584000 audit: BPF prog-id=21 op=LOAD Dec 13 14:13:49.585000 audit: BPF prog-id=22 op=LOAD Dec 13 14:13:49.585000 audit: BPF prog-id=23 op=LOAD Dec 13 14:13:49.585000 audit: BPF prog-id=19 op=UNLOAD Dec 13 14:13:49.585000 audit: BPF prog-id=20 op=UNLOAD Dec 13 14:13:49.632000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:49.669000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:49.669000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Dec 13 14:13:49.669000 audit[1486]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=60 a0=6 a1=fffff1fff630 a2=4000 a3=1 items=0 ppid=1 pid=1486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:13:49.669000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Dec 13 14:13:49.678000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:49.678000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:49.687000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:49.687000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:49.694000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:49.694000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:49.704000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:49.704000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:49.708000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:49.710000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:49.710000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:45.352439 /usr/lib/systemd/system-generators/torcx-generator[1410]: time="2024-12-13T14:13:45Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:13:49.289555 systemd[1]: Queued start job for default target multi-user.target. Dec 13 14:13:49.713000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:49.713000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:45.353571 /usr/lib/systemd/system-generators/torcx-generator[1410]: time="2024-12-13T14:13:45Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 14:13:49.314290 systemd[1]: systemd-journald.service: Deactivated successfully. Dec 13 14:13:45.353620 /usr/lib/systemd/system-generators/torcx-generator[1410]: time="2024-12-13T14:13:45Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 14:13:49.709802 systemd[1]: modprobe@fuse.service: Deactivated successfully. Dec 13 14:13:45.353687 /usr/lib/systemd/system-generators/torcx-generator[1410]: time="2024-12-13T14:13:45Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Dec 13 14:13:49.710077 systemd[1]: Finished modprobe@fuse.service. Dec 13 14:13:45.353713 /usr/lib/systemd/system-generators/torcx-generator[1410]: time="2024-12-13T14:13:45Z" level=debug msg="skipped missing lower profile" missing profile=oem Dec 13 14:13:49.712237 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:13:45.353779 /usr/lib/systemd/system-generators/torcx-generator[1410]: time="2024-12-13T14:13:45Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Dec 13 14:13:49.713431 systemd[1]: Finished modprobe@loop.service. Dec 13 14:13:45.353810 /usr/lib/systemd/system-generators/torcx-generator[1410]: time="2024-12-13T14:13:45Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Dec 13 14:13:49.715557 systemd[1]: Finished systemd-modules-load.service. Dec 13 14:13:49.716000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:45.354211 /usr/lib/systemd/system-generators/torcx-generator[1410]: time="2024-12-13T14:13:45Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Dec 13 14:13:45.354290 /usr/lib/systemd/system-generators/torcx-generator[1410]: time="2024-12-13T14:13:45Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 14:13:45.354326 /usr/lib/systemd/system-generators/torcx-generator[1410]: time="2024-12-13T14:13:45Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 14:13:45.355498 /usr/lib/systemd/system-generators/torcx-generator[1410]: time="2024-12-13T14:13:45Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Dec 13 14:13:45.355583 /usr/lib/systemd/system-generators/torcx-generator[1410]: time="2024-12-13T14:13:45Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Dec 13 14:13:45.355629 /usr/lib/systemd/system-generators/torcx-generator[1410]: time="2024-12-13T14:13:45Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.6: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.6 Dec 13 14:13:45.355668 /usr/lib/systemd/system-generators/torcx-generator[1410]: time="2024-12-13T14:13:45Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Dec 13 14:13:45.355714 /usr/lib/systemd/system-generators/torcx-generator[1410]: time="2024-12-13T14:13:45Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.6: no such file or directory" path=/var/lib/torcx/store/3510.3.6 Dec 13 14:13:45.355753 /usr/lib/systemd/system-generators/torcx-generator[1410]: time="2024-12-13T14:13:45Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Dec 13 14:13:48.414586 /usr/lib/systemd/system-generators/torcx-generator[1410]: time="2024-12-13T14:13:48Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:13:48.415126 /usr/lib/systemd/system-generators/torcx-generator[1410]: time="2024-12-13T14:13:48Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:13:48.415372 /usr/lib/systemd/system-generators/torcx-generator[1410]: time="2024-12-13T14:13:48Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:13:49.722000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:48.415844 /usr/lib/systemd/system-generators/torcx-generator[1410]: time="2024-12-13T14:13:48Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:13:49.721690 systemd[1]: Finished systemd-network-generator.service. Dec 13 14:13:48.415950 /usr/lib/systemd/system-generators/torcx-generator[1410]: time="2024-12-13T14:13:48Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Dec 13 14:13:48.416083 /usr/lib/systemd/system-generators/torcx-generator[1410]: time="2024-12-13T14:13:48Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Dec 13 14:13:49.724940 systemd[1]: Finished systemd-remount-fs.service. Dec 13 14:13:49.725000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:49.727685 systemd[1]: Reached target network-pre.target. Dec 13 14:13:49.732242 systemd[1]: Mounting sys-fs-fuse-connections.mount... Dec 13 14:13:49.736940 systemd[1]: Mounting sys-kernel-config.mount... Dec 13 14:13:49.738717 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Dec 13 14:13:49.741967 systemd[1]: Starting systemd-hwdb-update.service... Dec 13 14:13:49.745903 systemd[1]: Starting systemd-journal-flush.service... Dec 13 14:13:49.747637 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:13:49.753142 systemd[1]: Starting systemd-random-seed.service... Dec 13 14:13:49.754774 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:13:49.757007 systemd[1]: Starting systemd-sysctl.service... Dec 13 14:13:49.763717 systemd[1]: Mounted sys-fs-fuse-connections.mount. Dec 13 14:13:49.767032 systemd[1]: Mounted sys-kernel-config.mount. Dec 13 14:13:49.799183 systemd-journald[1486]: Time spent on flushing to /var/log/journal/ec28ed73cc71766accb02036a46392d7 is 71.530ms for 1143 entries. Dec 13 14:13:49.799183 systemd-journald[1486]: System Journal (/var/log/journal/ec28ed73cc71766accb02036a46392d7) is 8.0M, max 195.6M, 187.6M free. Dec 13 14:13:49.898362 systemd-journald[1486]: Received client request to flush runtime journal. Dec 13 14:13:49.812000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:49.839000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:49.867000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:49.811946 systemd[1]: Finished systemd-random-seed.service. Dec 13 14:13:49.813919 systemd[1]: Reached target first-boot-complete.target. Dec 13 14:13:49.838682 systemd[1]: Finished systemd-sysctl.service. Dec 13 14:13:49.866859 systemd[1]: Finished flatcar-tmpfiles.service. Dec 13 14:13:49.870792 systemd[1]: Starting systemd-sysusers.service... Dec 13 14:13:49.901000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:49.900470 systemd[1]: Finished systemd-journal-flush.service. Dec 13 14:13:49.920145 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 14:13:49.920000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:49.924015 systemd[1]: Starting systemd-udev-settle.service... Dec 13 14:13:49.939899 udevadm[1531]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Dec 13 14:13:50.109465 systemd[1]: Finished systemd-sysusers.service. Dec 13 14:13:50.110000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:50.113340 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 14:13:50.218672 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 14:13:50.219000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:50.638000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:50.639000 audit: BPF prog-id=24 op=LOAD Dec 13 14:13:50.639000 audit: BPF prog-id=25 op=LOAD Dec 13 14:13:50.639000 audit: BPF prog-id=7 op=UNLOAD Dec 13 14:13:50.639000 audit: BPF prog-id=8 op=UNLOAD Dec 13 14:13:50.637912 systemd[1]: Finished systemd-hwdb-update.service. Dec 13 14:13:50.641904 systemd[1]: Starting systemd-udevd.service... Dec 13 14:13:50.679451 systemd-udevd[1534]: Using default interface naming scheme 'v252'. Dec 13 14:13:50.730297 systemd[1]: Started systemd-udevd.service. Dec 13 14:13:50.730000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:50.732000 audit: BPF prog-id=26 op=LOAD Dec 13 14:13:50.734870 systemd[1]: Starting systemd-networkd.service... Dec 13 14:13:50.751000 audit: BPF prog-id=27 op=LOAD Dec 13 14:13:50.751000 audit: BPF prog-id=28 op=LOAD Dec 13 14:13:50.751000 audit: BPF prog-id=29 op=LOAD Dec 13 14:13:50.753946 systemd[1]: Starting systemd-userdbd.service... Dec 13 14:13:50.817028 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Dec 13 14:13:50.850336 systemd[1]: Started systemd-userdbd.service. Dec 13 14:13:50.850000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:50.871850 (udev-worker)[1541]: Network interface NamePolicy= disabled on kernel command line. Dec 13 14:13:51.030107 systemd-networkd[1540]: lo: Link UP Dec 13 14:13:51.030129 systemd-networkd[1540]: lo: Gained carrier Dec 13 14:13:51.031094 systemd-networkd[1540]: Enumeration completed Dec 13 14:13:51.031327 systemd[1]: Started systemd-networkd.service. Dec 13 14:13:51.031000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:51.034657 systemd-networkd[1540]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 14:13:51.035348 systemd[1]: Starting systemd-networkd-wait-online.service... Dec 13 14:13:51.048792 systemd-networkd[1540]: eth0: Link UP Dec 13 14:13:51.053793 systemd-networkd[1540]: eth0: Gained carrier Dec 13 14:13:51.054457 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:13:51.070767 systemd-networkd[1540]: eth0: DHCPv4 address 172.31.18.231/20, gateway 172.31.16.1 acquired from 172.31.16.1 Dec 13 14:13:51.085459 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/nvme0n1p6 scanned by (udev-worker) (1538) Dec 13 14:13:51.191572 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 14:13:51.200083 systemd[1]: Finished systemd-udev-settle.service. Dec 13 14:13:51.200000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:51.204193 systemd[1]: Starting lvm2-activation-early.service... Dec 13 14:13:51.264837 lvm[1653]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 14:13:51.303016 systemd[1]: Finished lvm2-activation-early.service. Dec 13 14:13:51.303000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:51.305157 systemd[1]: Reached target cryptsetup.target. Dec 13 14:13:51.309095 systemd[1]: Starting lvm2-activation.service... Dec 13 14:13:51.317503 lvm[1654]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 14:13:51.355097 systemd[1]: Finished lvm2-activation.service. Dec 13 14:13:51.355000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:51.356935 systemd[1]: Reached target local-fs-pre.target. Dec 13 14:13:51.358549 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Dec 13 14:13:51.358605 systemd[1]: Reached target local-fs.target. Dec 13 14:13:51.360171 systemd[1]: Reached target machines.target. Dec 13 14:13:51.363898 systemd[1]: Starting ldconfig.service... Dec 13 14:13:51.366987 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:13:51.367124 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:13:51.369497 systemd[1]: Starting systemd-boot-update.service... Dec 13 14:13:51.374658 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Dec 13 14:13:51.379109 systemd[1]: Starting systemd-machine-id-commit.service... Dec 13 14:13:51.384304 systemd[1]: Starting systemd-sysext.service... Dec 13 14:13:51.391585 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1656 (bootctl) Dec 13 14:13:51.394096 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Dec 13 14:13:51.422054 systemd[1]: Unmounting usr-share-oem.mount... Dec 13 14:13:51.432955 systemd[1]: usr-share-oem.mount: Deactivated successfully. Dec 13 14:13:51.433381 systemd[1]: Unmounted usr-share-oem.mount. Dec 13 14:13:51.463989 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Dec 13 14:13:51.465000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:51.484489 kernel: loop0: detected capacity change from 0 to 194512 Dec 13 14:13:51.555368 systemd-fsck[1666]: fsck.fat 4.2 (2021-01-31) Dec 13 14:13:51.555368 systemd-fsck[1666]: /dev/nvme0n1p1: 236 files, 117175/258078 clusters Dec 13 14:13:51.557395 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Dec 13 14:13:51.558000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:51.562156 systemd[1]: Mounting boot.mount... Dec 13 14:13:51.583295 systemd[1]: Mounted boot.mount. Dec 13 14:13:51.590015 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Dec 13 14:13:51.591000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:51.591068 systemd[1]: Finished systemd-machine-id-commit.service. Dec 13 14:13:51.617471 systemd[1]: Finished systemd-boot-update.service. Dec 13 14:13:51.618000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:51.690446 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Dec 13 14:13:51.713470 kernel: loop1: detected capacity change from 0 to 194512 Dec 13 14:13:51.729576 (sd-sysext)[1681]: Using extensions 'kubernetes'. Dec 13 14:13:51.730598 (sd-sysext)[1681]: Merged extensions into '/usr'. Dec 13 14:13:51.769686 systemd[1]: Mounting usr-share-oem.mount... Dec 13 14:13:51.771904 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:13:51.774801 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:13:51.782158 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:13:51.786907 systemd[1]: Starting modprobe@loop.service... Dec 13 14:13:51.788533 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:13:51.788860 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:13:51.797085 systemd[1]: Mounted usr-share-oem.mount. Dec 13 14:13:51.799547 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:13:51.799847 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:13:51.800000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:51.800000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:51.802384 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:13:51.802729 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:13:51.803000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:51.803000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:51.805503 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:13:51.806000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:51.806000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:51.805804 systemd[1]: Finished modprobe@loop.service. Dec 13 14:13:51.808509 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:13:51.808690 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:13:51.810355 systemd[1]: Finished systemd-sysext.service. Dec 13 14:13:51.810000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:51.814961 systemd[1]: Starting ensure-sysext.service... Dec 13 14:13:51.818583 systemd[1]: Starting systemd-tmpfiles-setup.service... Dec 13 14:13:51.832047 systemd[1]: Reloading. Dec 13 14:13:51.855761 systemd-tmpfiles[1688]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Dec 13 14:13:51.862124 systemd-tmpfiles[1688]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Dec 13 14:13:51.867479 systemd-tmpfiles[1688]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Dec 13 14:13:51.972901 /usr/lib/systemd/system-generators/torcx-generator[1710]: time="2024-12-13T14:13:51Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:13:51.974089 /usr/lib/systemd/system-generators/torcx-generator[1710]: time="2024-12-13T14:13:51Z" level=info msg="torcx already run" Dec 13 14:13:52.179022 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:13:52.179059 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:13:52.220500 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:13:52.360000 audit: BPF prog-id=30 op=LOAD Dec 13 14:13:52.361000 audit: BPF prog-id=21 op=UNLOAD Dec 13 14:13:52.361000 audit: BPF prog-id=31 op=LOAD Dec 13 14:13:52.361000 audit: BPF prog-id=32 op=LOAD Dec 13 14:13:52.361000 audit: BPF prog-id=22 op=UNLOAD Dec 13 14:13:52.361000 audit: BPF prog-id=23 op=UNLOAD Dec 13 14:13:52.363000 audit: BPF prog-id=33 op=LOAD Dec 13 14:13:52.363000 audit: BPF prog-id=26 op=UNLOAD Dec 13 14:13:52.367000 audit: BPF prog-id=34 op=LOAD Dec 13 14:13:52.367000 audit: BPF prog-id=35 op=LOAD Dec 13 14:13:52.367000 audit: BPF prog-id=24 op=UNLOAD Dec 13 14:13:52.367000 audit: BPF prog-id=25 op=UNLOAD Dec 13 14:13:52.371000 audit: BPF prog-id=36 op=LOAD Dec 13 14:13:52.371000 audit: BPF prog-id=27 op=UNLOAD Dec 13 14:13:52.371000 audit: BPF prog-id=37 op=LOAD Dec 13 14:13:52.371000 audit: BPF prog-id=38 op=LOAD Dec 13 14:13:52.371000 audit: BPF prog-id=28 op=UNLOAD Dec 13 14:13:52.371000 audit: BPF prog-id=29 op=UNLOAD Dec 13 14:13:52.381800 systemd[1]: Finished systemd-tmpfiles-setup.service. Dec 13 14:13:52.382000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:52.390192 systemd[1]: Starting audit-rules.service... Dec 13 14:13:52.393918 systemd[1]: Starting clean-ca-certificates.service... Dec 13 14:13:52.400000 audit: BPF prog-id=39 op=LOAD Dec 13 14:13:52.398534 systemd[1]: Starting systemd-journal-catalog-update.service... Dec 13 14:13:52.404786 systemd[1]: Starting systemd-resolved.service... Dec 13 14:13:52.408000 audit: BPF prog-id=40 op=LOAD Dec 13 14:13:52.411632 systemd[1]: Starting systemd-timesyncd.service... Dec 13 14:13:52.416898 systemd[1]: Starting systemd-update-utmp.service... Dec 13 14:13:52.438000 audit[1770]: SYSTEM_BOOT pid=1770 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Dec 13 14:13:52.445682 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:13:52.450999 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:13:52.456444 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:13:52.461383 systemd[1]: Starting modprobe@loop.service... Dec 13 14:13:52.463681 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:13:52.464142 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:13:52.469343 systemd[1]: Finished systemd-update-utmp.service. Dec 13 14:13:52.470000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:52.476201 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:13:52.476989 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:13:52.477245 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:13:52.479452 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:13:52.480219 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:13:52.480000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:52.480000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:52.490272 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:13:52.491554 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:13:52.492000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:52.492000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:52.494663 systemd[1]: Finished clean-ca-certificates.service. Dec 13 14:13:52.495000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:52.498079 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:13:52.501859 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:13:52.507065 systemd[1]: Starting modprobe@drm.service... Dec 13 14:13:52.508750 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:13:52.509097 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:13:52.509391 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:13:52.509658 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 14:13:52.515186 systemd[1]: Finished ensure-sysext.service. Dec 13 14:13:52.515000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:52.517637 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:13:52.517991 systemd[1]: Finished modprobe@loop.service. Dec 13 14:13:52.518000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:52.518000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:52.530261 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:13:52.530621 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:13:52.532530 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:13:52.530000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:52.530000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:52.535615 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 14:13:52.535908 systemd[1]: Finished modprobe@drm.service. Dec 13 14:13:52.536000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:52.536000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:52.570215 systemd[1]: Finished systemd-journal-catalog-update.service. Dec 13 14:13:52.570000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:13:52.618000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Dec 13 14:13:52.618000 audit[1789]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffd69ae950 a2=420 a3=0 items=0 ppid=1764 pid=1789 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:13:52.618000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Dec 13 14:13:52.620240 augenrules[1789]: No rules Dec 13 14:13:52.621354 ldconfig[1655]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Dec 13 14:13:52.621782 systemd[1]: Finished audit-rules.service. Dec 13 14:13:52.634177 systemd[1]: Finished ldconfig.service. Dec 13 14:13:52.638168 systemd[1]: Starting systemd-update-done.service... Dec 13 14:13:52.660481 systemd[1]: Finished systemd-update-done.service. Dec 13 14:13:52.664054 systemd[1]: Started systemd-timesyncd.service. Dec 13 14:13:52.665916 systemd[1]: Reached target time-set.target. Dec 13 14:13:52.682896 systemd-resolved[1767]: Positive Trust Anchors: Dec 13 14:13:52.683390 systemd-resolved[1767]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 14:13:52.683580 systemd-resolved[1767]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 14:13:52.709105 systemd-resolved[1767]: Defaulting to hostname 'linux'. Dec 13 14:13:52.712229 systemd[1]: Started systemd-resolved.service. Dec 13 14:13:52.713957 systemd[1]: Reached target network.target. Dec 13 14:13:52.715498 systemd[1]: Reached target nss-lookup.target. Dec 13 14:13:52.717071 systemd[1]: Reached target sysinit.target. Dec 13 14:13:52.718723 systemd[1]: Started motdgen.path. Dec 13 14:13:52.720131 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Dec 13 14:13:52.722451 systemd[1]: Started logrotate.timer. Dec 13 14:13:52.723978 systemd[1]: Started mdadm.timer. Dec 13 14:13:52.725287 systemd[1]: Started systemd-tmpfiles-clean.timer. Dec 13 14:13:52.726884 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Dec 13 14:13:52.726936 systemd[1]: Reached target paths.target. Dec 13 14:13:52.728314 systemd[1]: Reached target timers.target. Dec 13 14:13:52.730467 systemd[1]: Listening on dbus.socket. Dec 13 14:13:52.733964 systemd[1]: Starting docker.socket... Dec 13 14:13:52.740775 systemd[1]: Listening on sshd.socket. Dec 13 14:13:52.742529 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:13:52.743542 systemd[1]: Listening on docker.socket. Dec 13 14:13:52.745165 systemd[1]: Reached target sockets.target. Dec 13 14:13:52.746695 systemd[1]: Reached target basic.target. Dec 13 14:13:52.748184 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 14:13:52.748259 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 14:13:52.750266 systemd[1]: Starting containerd.service... Dec 13 14:13:52.755337 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Dec 13 14:13:52.759599 systemd[1]: Starting dbus.service... Dec 13 14:13:52.763481 systemd[1]: Starting enable-oem-cloudinit.service... Dec 13 14:13:52.769888 systemd[1]: Starting extend-filesystems.service... Dec 13 14:13:52.772640 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Dec 13 14:13:52.776966 systemd[1]: Starting motdgen.service... Dec 13 14:13:52.785339 jq[1801]: false Dec 13 14:13:52.786919 systemd[1]: Starting prepare-helm.service... Dec 13 14:13:52.790795 systemd[1]: Starting ssh-key-proc-cmdline.service... Dec 13 14:13:52.794920 systemd[1]: Starting sshd-keygen.service... Dec 13 14:13:52.803932 systemd-timesyncd[1768]: Contacted time server 67.217.246.204:123 (0.flatcar.pool.ntp.org). Dec 13 14:13:52.804042 systemd-timesyncd[1768]: Initial clock synchronization to Fri 2024-12-13 14:13:52.572830 UTC. Dec 13 14:13:52.804785 systemd[1]: Starting systemd-logind.service... Dec 13 14:13:52.806300 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:13:52.806456 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Dec 13 14:13:52.807366 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Dec 13 14:13:52.814166 systemd[1]: Starting update-engine.service... Dec 13 14:13:52.817873 systemd[1]: Starting update-ssh-keys-after-ignition.service... Dec 13 14:13:52.823728 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Dec 13 14:13:52.825205 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Dec 13 14:13:52.826261 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Dec 13 14:13:52.827087 systemd[1]: Finished ssh-key-proc-cmdline.service. Dec 13 14:13:52.855753 jq[1814]: true Dec 13 14:13:52.884988 tar[1821]: linux-arm64/helm Dec 13 14:13:52.886999 extend-filesystems[1802]: Found loop1 Dec 13 14:13:52.891278 extend-filesystems[1802]: Found nvme0n1 Dec 13 14:13:52.894661 extend-filesystems[1802]: Found nvme0n1p1 Dec 13 14:13:52.897708 extend-filesystems[1802]: Found nvme0n1p2 Dec 13 14:13:52.900668 extend-filesystems[1802]: Found nvme0n1p3 Dec 13 14:13:52.905702 jq[1825]: true Dec 13 14:13:52.906597 extend-filesystems[1802]: Found usr Dec 13 14:13:52.909022 extend-filesystems[1802]: Found nvme0n1p4 Dec 13 14:13:52.910679 systemd-networkd[1540]: eth0: Gained IPv6LL Dec 13 14:13:52.915885 systemd[1]: Finished systemd-networkd-wait-online.service. Dec 13 14:13:52.918039 systemd[1]: Reached target network-online.target. Dec 13 14:13:52.922182 extend-filesystems[1802]: Found nvme0n1p6 Dec 13 14:13:52.924526 extend-filesystems[1802]: Found nvme0n1p7 Dec 13 14:13:52.924894 systemd[1]: Started amazon-ssm-agent.service. Dec 13 14:13:52.929494 systemd[1]: Starting kubelet.service... Dec 13 14:13:52.934309 systemd[1]: Started nvidia.service. Dec 13 14:13:52.941883 dbus-daemon[1800]: [system] SELinux support is enabled Dec 13 14:13:52.942211 systemd[1]: Started dbus.service. Dec 13 14:13:52.944448 extend-filesystems[1802]: Found nvme0n1p9 Dec 13 14:13:52.944448 extend-filesystems[1802]: Checking size of /dev/nvme0n1p9 Dec 13 14:13:52.947812 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Dec 13 14:13:52.947857 systemd[1]: Reached target system-config.target. Dec 13 14:13:52.961163 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Dec 13 14:13:52.961206 systemd[1]: Reached target user-config.target. Dec 13 14:13:53.000190 systemd[1]: motdgen.service: Deactivated successfully. Dec 13 14:13:53.000563 systemd[1]: Finished motdgen.service. Dec 13 14:13:53.009193 dbus-daemon[1800]: [system] Activating systemd to hand-off: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.1' (uid=244 pid=1540 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0") Dec 13 14:13:53.022135 dbus-daemon[1800]: [system] Successfully activated service 'org.freedesktop.systemd1' Dec 13 14:13:53.032679 systemd[1]: Starting systemd-hostnamed.service... Dec 13 14:13:53.148583 extend-filesystems[1802]: Resized partition /dev/nvme0n1p9 Dec 13 14:13:53.167014 extend-filesystems[1858]: resize2fs 1.46.5 (30-Dec-2021) Dec 13 14:13:53.186850 update_engine[1812]: I1213 14:13:53.186270 1812 main.cc:92] Flatcar Update Engine starting Dec 13 14:13:53.213456 kernel: EXT4-fs (nvme0n1p9): resizing filesystem from 553472 to 1489915 blocks Dec 13 14:13:53.218313 systemd[1]: Started update-engine.service. Dec 13 14:13:53.222956 systemd[1]: Started locksmithd.service. Dec 13 14:13:53.224621 update_engine[1812]: I1213 14:13:53.224191 1812 update_check_scheduler.cc:74] Next update check in 7m20s Dec 13 14:13:53.287444 kernel: EXT4-fs (nvme0n1p9): resized filesystem to 1489915 Dec 13 14:13:53.297233 amazon-ssm-agent[1834]: 2024/12/13 14:13:53 Failed to load instance info from vault. RegistrationKey does not exist. Dec 13 14:13:53.301807 extend-filesystems[1858]: Filesystem at /dev/nvme0n1p9 is mounted on /; on-line resizing required Dec 13 14:13:53.301807 extend-filesystems[1858]: old_desc_blocks = 1, new_desc_blocks = 1 Dec 13 14:13:53.301807 extend-filesystems[1858]: The filesystem on /dev/nvme0n1p9 is now 1489915 (4k) blocks long. Dec 13 14:13:53.308863 amazon-ssm-agent[1834]: Initializing new seelog logger Dec 13 14:13:53.308863 amazon-ssm-agent[1834]: New Seelog Logger Creation Complete Dec 13 14:13:53.308353 systemd[1]: Finished update-ssh-keys-after-ignition.service. Dec 13 14:13:53.321880 bash[1863]: Updated "/home/core/.ssh/authorized_keys" Dec 13 14:13:53.322063 amazon-ssm-agent[1834]: 2024/12/13 14:13:53 Found config file at /etc/amazon/ssm/amazon-ssm-agent.json. Dec 13 14:13:53.322063 amazon-ssm-agent[1834]: Applying config override from /etc/amazon/ssm/amazon-ssm-agent.json. Dec 13 14:13:53.322063 amazon-ssm-agent[1834]: 2024/12/13 14:13:53 processing appconfig overrides Dec 13 14:13:53.323067 extend-filesystems[1802]: Resized filesystem in /dev/nvme0n1p9 Dec 13 14:13:53.325673 systemd[1]: extend-filesystems.service: Deactivated successfully. Dec 13 14:13:53.326070 systemd[1]: Finished extend-filesystems.service. Dec 13 14:13:53.335231 env[1818]: time="2024-12-13T14:13:53.335141999Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Dec 13 14:13:53.405962 systemd-logind[1810]: Watching system buttons on /dev/input/event0 (Power Button) Dec 13 14:13:53.408314 systemd-logind[1810]: Watching system buttons on /dev/input/event1 (Sleep Button) Dec 13 14:13:53.416264 systemd-logind[1810]: New seat seat0. Dec 13 14:13:53.500406 systemd[1]: nvidia.service: Deactivated successfully. Dec 13 14:13:53.582282 env[1818]: time="2024-12-13T14:13:53.582054409Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Dec 13 14:13:53.585374 env[1818]: time="2024-12-13T14:13:53.585317879Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:13:53.588947 env[1818]: time="2024-12-13T14:13:53.588552692Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.173-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Dec 13 14:13:53.589893 env[1818]: time="2024-12-13T14:13:53.589845861Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:13:53.593620 env[1818]: time="2024-12-13T14:13:53.593541250Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 14:13:53.597092 dbus-daemon[1800]: [system] Successfully activated service 'org.freedesktop.hostname1' Dec 13 14:13:53.597389 systemd[1]: Started systemd-hostnamed.service. Dec 13 14:13:53.602230 systemd[1]: Started systemd-logind.service. Dec 13 14:13:53.604741 dbus-daemon[1800]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.5' (uid=0 pid=1842 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0") Dec 13 14:13:53.605209 env[1818]: time="2024-12-13T14:13:53.605142696Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Dec 13 14:13:53.606251 env[1818]: time="2024-12-13T14:13:53.606198591Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Dec 13 14:13:53.606595 env[1818]: time="2024-12-13T14:13:53.606562882Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Dec 13 14:13:53.608189 env[1818]: time="2024-12-13T14:13:53.608140630Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:13:53.609798 systemd[1]: Starting polkit.service... Dec 13 14:13:53.613821 env[1818]: time="2024-12-13T14:13:53.613768315Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:13:53.617571 env[1818]: time="2024-12-13T14:13:53.617507931Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 14:13:53.618133 env[1818]: time="2024-12-13T14:13:53.618097493Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Dec 13 14:13:53.619009 env[1818]: time="2024-12-13T14:13:53.618406824Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Dec 13 14:13:53.619208 env[1818]: time="2024-12-13T14:13:53.619177384Z" level=info msg="metadata content store policy set" policy=shared Dec 13 14:13:53.633005 env[1818]: time="2024-12-13T14:13:53.632949636Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Dec 13 14:13:53.633208 env[1818]: time="2024-12-13T14:13:53.633173835Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Dec 13 14:13:53.633364 env[1818]: time="2024-12-13T14:13:53.633334391Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Dec 13 14:13:53.633672 env[1818]: time="2024-12-13T14:13:53.633638338Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Dec 13 14:13:53.633855 env[1818]: time="2024-12-13T14:13:53.633825699Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Dec 13 14:13:53.633980 env[1818]: time="2024-12-13T14:13:53.633950909Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Dec 13 14:13:53.634097 env[1818]: time="2024-12-13T14:13:53.634069325Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Dec 13 14:13:53.634736 env[1818]: time="2024-12-13T14:13:53.634690830Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Dec 13 14:13:53.634904 env[1818]: time="2024-12-13T14:13:53.634873996Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Dec 13 14:13:53.635029 env[1818]: time="2024-12-13T14:13:53.634999695Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Dec 13 14:13:53.635177 env[1818]: time="2024-12-13T14:13:53.635146745Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Dec 13 14:13:53.635297 env[1818]: time="2024-12-13T14:13:53.635268785Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Dec 13 14:13:53.635646 env[1818]: time="2024-12-13T14:13:53.635613031Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Dec 13 14:13:53.635931 env[1818]: time="2024-12-13T14:13:53.635899381Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Dec 13 14:13:53.636550 env[1818]: time="2024-12-13T14:13:53.636515094Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Dec 13 14:13:53.637045 env[1818]: time="2024-12-13T14:13:53.637007672Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Dec 13 14:13:53.637239 env[1818]: time="2024-12-13T14:13:53.637207479Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Dec 13 14:13:53.637501 env[1818]: time="2024-12-13T14:13:53.637468948Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Dec 13 14:13:53.637940 env[1818]: time="2024-12-13T14:13:53.637907090Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Dec 13 14:13:53.638115 env[1818]: time="2024-12-13T14:13:53.638073975Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Dec 13 14:13:53.638265 env[1818]: time="2024-12-13T14:13:53.638234718Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Dec 13 14:13:53.638503 env[1818]: time="2024-12-13T14:13:53.638471258Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Dec 13 14:13:53.638631 env[1818]: time="2024-12-13T14:13:53.638602202Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Dec 13 14:13:53.639006 env[1818]: time="2024-12-13T14:13:53.638970211Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Dec 13 14:13:53.641501 env[1818]: time="2024-12-13T14:13:53.641460475Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Dec 13 14:13:53.641672 env[1818]: time="2024-12-13T14:13:53.641642324Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Dec 13 14:13:53.643152 env[1818]: time="2024-12-13T14:13:53.643100910Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Dec 13 14:13:53.643723 env[1818]: time="2024-12-13T14:13:53.643682734Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Dec 13 14:13:53.643913 env[1818]: time="2024-12-13T14:13:53.643877902Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Dec 13 14:13:53.644086 env[1818]: time="2024-12-13T14:13:53.644055381Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Dec 13 14:13:53.644624 env[1818]: time="2024-12-13T14:13:53.644576231Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Dec 13 14:13:53.645033 env[1818]: time="2024-12-13T14:13:53.644995121Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Dec 13 14:13:53.645194 env[1818]: time="2024-12-13T14:13:53.645161936Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Dec 13 14:13:53.646658 env[1818]: time="2024-12-13T14:13:53.646603600Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Dec 13 14:13:53.647744 env[1818]: time="2024-12-13T14:13:53.647603918Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Dec 13 14:13:53.649271 env[1818]: time="2024-12-13T14:13:53.649005027Z" level=info msg="Connect containerd service" Dec 13 14:13:53.649271 env[1818]: time="2024-12-13T14:13:53.649089763Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Dec 13 14:13:53.653751 env[1818]: time="2024-12-13T14:13:53.653698519Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 14:13:53.656960 env[1818]: time="2024-12-13T14:13:53.656873139Z" level=info msg="Start subscribing containerd event" Dec 13 14:13:53.660565 env[1818]: time="2024-12-13T14:13:53.660514966Z" level=info msg="Start recovering state" Dec 13 14:13:53.661202 env[1818]: time="2024-12-13T14:13:53.661169265Z" level=info msg="Start event monitor" Dec 13 14:13:53.661408 env[1818]: time="2024-12-13T14:13:53.661362558Z" level=info msg="Start snapshots syncer" Dec 13 14:13:53.661841 env[1818]: time="2024-12-13T14:13:53.661809219Z" level=info msg="Start cni network conf syncer for default" Dec 13 14:13:53.661986 env[1818]: time="2024-12-13T14:13:53.661934593Z" level=info msg="Start streaming server" Dec 13 14:13:53.662239 env[1818]: time="2024-12-13T14:13:53.657523558Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Dec 13 14:13:53.662822 env[1818]: time="2024-12-13T14:13:53.662783187Z" level=info msg=serving... address=/run/containerd/containerd.sock Dec 13 14:13:53.664481 env[1818]: time="2024-12-13T14:13:53.664439040Z" level=info msg="containerd successfully booted in 0.346697s" Dec 13 14:13:53.664565 systemd[1]: Started containerd.service. Dec 13 14:13:53.670710 polkitd[1900]: Started polkitd version 121 Dec 13 14:13:53.703962 polkitd[1900]: Loading rules from directory /etc/polkit-1/rules.d Dec 13 14:13:53.704081 polkitd[1900]: Loading rules from directory /usr/share/polkit-1/rules.d Dec 13 14:13:53.718684 polkitd[1900]: Finished loading, compiling and executing 2 rules Dec 13 14:13:53.719618 dbus-daemon[1800]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' Dec 13 14:13:53.719876 systemd[1]: Started polkit.service. Dec 13 14:13:53.722678 polkitd[1900]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Dec 13 14:13:53.755514 systemd-hostnamed[1842]: Hostname set to (transient) Dec 13 14:13:53.755668 systemd-resolved[1767]: System hostname changed to 'ip-172-31-18-231'. Dec 13 14:13:53.940175 coreos-metadata[1799]: Dec 13 14:13:53.939 INFO Putting http://169.254.169.254/latest/api/token: Attempt #1 Dec 13 14:13:53.941243 coreos-metadata[1799]: Dec 13 14:13:53.940 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys: Attempt #1 Dec 13 14:13:53.945896 coreos-metadata[1799]: Dec 13 14:13:53.945 INFO Fetch successful Dec 13 14:13:53.946620 coreos-metadata[1799]: Dec 13 14:13:53.946 INFO Fetching http://169.254.169.254/2019-10-01/meta-data/public-keys/0/openssh-key: Attempt #1 Dec 13 14:13:53.947151 coreos-metadata[1799]: Dec 13 14:13:53.946 INFO Fetch successful Dec 13 14:13:53.949960 unknown[1799]: wrote ssh authorized keys file for user: core Dec 13 14:13:53.979786 update-ssh-keys[1941]: Updated "/home/core/.ssh/authorized_keys" Dec 13 14:13:53.980864 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Dec 13 14:13:54.152161 amazon-ssm-agent[1834]: 2024-12-13 14:13:54 INFO Create new startup processor Dec 13 14:13:54.171450 amazon-ssm-agent[1834]: 2024-12-13 14:13:54 INFO [LongRunningPluginsManager] registered plugins: {} Dec 13 14:13:54.171658 amazon-ssm-agent[1834]: 2024-12-13 14:13:54 INFO Initializing bookkeeping folders Dec 13 14:13:54.171789 amazon-ssm-agent[1834]: 2024-12-13 14:13:54 INFO removing the completed state files Dec 13 14:13:54.171917 amazon-ssm-agent[1834]: 2024-12-13 14:13:54 INFO Initializing bookkeeping folders for long running plugins Dec 13 14:13:54.172052 amazon-ssm-agent[1834]: 2024-12-13 14:13:54 INFO Initializing replies folder for MDS reply requests that couldn't reach the service Dec 13 14:13:54.172204 amazon-ssm-agent[1834]: 2024-12-13 14:13:54 INFO Initializing healthcheck folders for long running plugins Dec 13 14:13:54.172332 amazon-ssm-agent[1834]: 2024-12-13 14:13:54 INFO Initializing locations for inventory plugin Dec 13 14:13:54.172476 amazon-ssm-agent[1834]: 2024-12-13 14:13:54 INFO Initializing default location for custom inventory Dec 13 14:13:54.172616 amazon-ssm-agent[1834]: 2024-12-13 14:13:54 INFO Initializing default location for file inventory Dec 13 14:13:54.172761 amazon-ssm-agent[1834]: 2024-12-13 14:13:54 INFO Initializing default location for role inventory Dec 13 14:13:54.172890 amazon-ssm-agent[1834]: 2024-12-13 14:13:54 INFO Init the cloudwatchlogs publisher Dec 13 14:13:54.173017 amazon-ssm-agent[1834]: 2024-12-13 14:13:54 INFO [instanceID=i-05c427e5ce81599b1] Successfully loaded platform independent plugin aws:runPowerShellScript Dec 13 14:13:54.173154 amazon-ssm-agent[1834]: 2024-12-13 14:13:54 INFO [instanceID=i-05c427e5ce81599b1] Successfully loaded platform independent plugin aws:runDockerAction Dec 13 14:13:54.173295 amazon-ssm-agent[1834]: 2024-12-13 14:13:54 INFO [instanceID=i-05c427e5ce81599b1] Successfully loaded platform independent plugin aws:configurePackage Dec 13 14:13:54.173444 amazon-ssm-agent[1834]: 2024-12-13 14:13:54 INFO [instanceID=i-05c427e5ce81599b1] Successfully loaded platform independent plugin aws:downloadContent Dec 13 14:13:54.173574 amazon-ssm-agent[1834]: 2024-12-13 14:13:54 INFO [instanceID=i-05c427e5ce81599b1] Successfully loaded platform independent plugin aws:runDocument Dec 13 14:13:54.173701 amazon-ssm-agent[1834]: 2024-12-13 14:13:54 INFO [instanceID=i-05c427e5ce81599b1] Successfully loaded platform independent plugin aws:softwareInventory Dec 13 14:13:54.173827 amazon-ssm-agent[1834]: 2024-12-13 14:13:54 INFO [instanceID=i-05c427e5ce81599b1] Successfully loaded platform independent plugin aws:updateSsmAgent Dec 13 14:13:54.173953 amazon-ssm-agent[1834]: 2024-12-13 14:13:54 INFO [instanceID=i-05c427e5ce81599b1] Successfully loaded platform independent plugin aws:configureDocker Dec 13 14:13:54.174103 amazon-ssm-agent[1834]: 2024-12-13 14:13:54 INFO [instanceID=i-05c427e5ce81599b1] Successfully loaded platform independent plugin aws:refreshAssociation Dec 13 14:13:54.174231 amazon-ssm-agent[1834]: 2024-12-13 14:13:54 INFO [instanceID=i-05c427e5ce81599b1] Successfully loaded platform dependent plugin aws:runShellScript Dec 13 14:13:54.174356 amazon-ssm-agent[1834]: 2024-12-13 14:13:54 INFO Starting Agent: amazon-ssm-agent - v2.3.1319.0 Dec 13 14:13:54.174498 amazon-ssm-agent[1834]: 2024-12-13 14:13:54 INFO OS: linux, Arch: arm64 Dec 13 14:13:54.178250 amazon-ssm-agent[1834]: datastore file /var/lib/amazon/ssm/i-05c427e5ce81599b1/longrunningplugins/datastore/store doesn't exist - no long running plugins to execute Dec 13 14:13:54.254102 amazon-ssm-agent[1834]: 2024-12-13 14:13:54 INFO [MessageGatewayService] Starting session document processing engine... Dec 13 14:13:54.348919 amazon-ssm-agent[1834]: 2024-12-13 14:13:54 INFO [MessageGatewayService] [EngineProcessor] Starting Dec 13 14:13:54.443224 amazon-ssm-agent[1834]: 2024-12-13 14:13:54 INFO [MessageGatewayService] SSM Agent is trying to setup control channel for Session Manager module. Dec 13 14:13:54.537894 amazon-ssm-agent[1834]: 2024-12-13 14:13:54 INFO [MessageGatewayService] Setting up websocket for controlchannel for instance: i-05c427e5ce81599b1, requestId: 5cf1ab92-f131-4d06-8743-4e6848d89234 Dec 13 14:13:54.632469 amazon-ssm-agent[1834]: 2024-12-13 14:13:54 INFO [MessagingDeliveryService] Starting document processing engine... Dec 13 14:13:54.665115 tar[1821]: linux-arm64/LICENSE Dec 13 14:13:54.665835 tar[1821]: linux-arm64/README.md Dec 13 14:13:54.677851 systemd[1]: Finished prepare-helm.service. Dec 13 14:13:54.727384 amazon-ssm-agent[1834]: 2024-12-13 14:13:54 INFO [MessagingDeliveryService] [EngineProcessor] Starting Dec 13 14:13:54.819232 locksmithd[1867]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Dec 13 14:13:54.822454 amazon-ssm-agent[1834]: 2024-12-13 14:13:54 INFO [MessagingDeliveryService] [EngineProcessor] Initial processing Dec 13 14:13:54.917777 amazon-ssm-agent[1834]: 2024-12-13 14:13:54 INFO [MessagingDeliveryService] Starting message polling Dec 13 14:13:55.013230 amazon-ssm-agent[1834]: 2024-12-13 14:13:54 INFO [MessagingDeliveryService] Starting send replies to MDS Dec 13 14:13:55.108993 amazon-ssm-agent[1834]: 2024-12-13 14:13:54 INFO [instanceID=i-05c427e5ce81599b1] Starting association polling Dec 13 14:13:55.204829 amazon-ssm-agent[1834]: 2024-12-13 14:13:54 INFO [MessagingDeliveryService] [Association] [EngineProcessor] Starting Dec 13 14:13:55.300931 amazon-ssm-agent[1834]: 2024-12-13 14:13:54 INFO [MessagingDeliveryService] [Association] Launching response handler Dec 13 14:13:55.315381 sshd_keygen[1829]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Dec 13 14:13:55.353761 systemd[1]: Finished sshd-keygen.service. Dec 13 14:13:55.358256 systemd[1]: Starting issuegen.service... Dec 13 14:13:55.369310 systemd[1]: issuegen.service: Deactivated successfully. Dec 13 14:13:55.369706 systemd[1]: Finished issuegen.service. Dec 13 14:13:55.374033 systemd[1]: Starting systemd-user-sessions.service... Dec 13 14:13:55.389551 systemd[1]: Finished systemd-user-sessions.service. Dec 13 14:13:55.393925 systemd[1]: Started getty@tty1.service. Dec 13 14:13:55.397280 amazon-ssm-agent[1834]: 2024-12-13 14:13:54 INFO [MessagingDeliveryService] [Association] [EngineProcessor] Initial processing Dec 13 14:13:55.398217 systemd[1]: Started serial-getty@ttyS0.service. Dec 13 14:13:55.400877 systemd[1]: Reached target getty.target. Dec 13 14:13:55.487952 systemd[1]: Started kubelet.service. Dec 13 14:13:55.491105 systemd[1]: Reached target multi-user.target. Dec 13 14:13:55.493736 amazon-ssm-agent[1834]: 2024-12-13 14:13:54 INFO [MessagingDeliveryService] [Association] Initializing association scheduling service Dec 13 14:13:55.496032 systemd[1]: Starting systemd-update-utmp-runlevel.service... Dec 13 14:13:55.510959 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Dec 13 14:13:55.511537 systemd[1]: Finished systemd-update-utmp-runlevel.service. Dec 13 14:13:55.514784 systemd[1]: Startup finished in 1.119s (kernel) + 8.233s (initrd) + 10.690s (userspace) = 20.043s. Dec 13 14:13:55.590372 amazon-ssm-agent[1834]: 2024-12-13 14:13:54 INFO [MessagingDeliveryService] [Association] Association scheduling service initialized Dec 13 14:13:55.687276 amazon-ssm-agent[1834]: 2024-12-13 14:13:54 INFO [MessageGatewayService] listening reply. Dec 13 14:13:55.784250 amazon-ssm-agent[1834]: 2024-12-13 14:13:54 INFO [HealthCheck] HealthCheck reporting agent health. Dec 13 14:13:55.881505 amazon-ssm-agent[1834]: 2024-12-13 14:13:54 INFO [OfflineService] Starting document processing engine... Dec 13 14:13:55.979018 amazon-ssm-agent[1834]: 2024-12-13 14:13:54 INFO [OfflineService] [EngineProcessor] Starting Dec 13 14:13:56.076587 amazon-ssm-agent[1834]: 2024-12-13 14:13:54 INFO [OfflineService] [EngineProcessor] Initial processing Dec 13 14:13:56.174389 amazon-ssm-agent[1834]: 2024-12-13 14:13:54 INFO [OfflineService] Starting message polling Dec 13 14:13:56.272519 amazon-ssm-agent[1834]: 2024-12-13 14:13:54 INFO [OfflineService] Starting send replies to MDS Dec 13 14:13:56.370707 amazon-ssm-agent[1834]: 2024-12-13 14:13:54 INFO [LongRunningPluginsManager] starting long running plugin manager Dec 13 14:13:56.469148 amazon-ssm-agent[1834]: 2024-12-13 14:13:54 INFO [StartupProcessor] Executing startup processor tasks Dec 13 14:13:56.567817 amazon-ssm-agent[1834]: 2024-12-13 14:13:54 INFO [StartupProcessor] Write to serial port: Amazon SSM Agent v2.3.1319.0 is running Dec 13 14:13:56.666578 amazon-ssm-agent[1834]: 2024-12-13 14:13:54 INFO [StartupProcessor] Write to serial port: OsProductName: Flatcar Container Linux by Kinvolk Dec 13 14:13:56.765656 amazon-ssm-agent[1834]: 2024-12-13 14:13:54 INFO [StartupProcessor] Write to serial port: OsVersion: 3510.3.6 Dec 13 14:13:56.865188 amazon-ssm-agent[1834]: 2024-12-13 14:13:54 INFO [LongRunningPluginsManager] there aren't any long running plugin to execute Dec 13 14:13:56.911394 kubelet[2012]: E1213 14:13:56.911263 2012 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:13:56.915354 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:13:56.915706 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:13:56.916146 systemd[1]: kubelet.service: Consumed 1.462s CPU time. Dec 13 14:13:56.964583 amazon-ssm-agent[1834]: 2024-12-13 14:13:54 INFO [LongRunningPluginsManager] There are no long running plugins currently getting executed - skipping their healthcheck Dec 13 14:13:57.064129 amazon-ssm-agent[1834]: 2024-12-13 14:13:54 INFO [MessageGatewayService] Opening websocket connection to: wss://ssmmessages.us-west-2.amazonaws.com/v1/control-channel/i-05c427e5ce81599b1?role=subscribe&stream=input Dec 13 14:13:57.163980 amazon-ssm-agent[1834]: 2024-12-13 14:13:54 INFO [MessageGatewayService] Successfully opened websocket connection to: wss://ssmmessages.us-west-2.amazonaws.com/v1/control-channel/i-05c427e5ce81599b1?role=subscribe&stream=input Dec 13 14:13:57.263885 amazon-ssm-agent[1834]: 2024-12-13 14:13:54 INFO [MessageGatewayService] Starting receiving message from control channel Dec 13 14:13:57.364041 amazon-ssm-agent[1834]: 2024-12-13 14:13:54 INFO [MessageGatewayService] [EngineProcessor] Initial processing Dec 13 14:13:59.607657 amazon-ssm-agent[1834]: 2024-12-13 14:13:59 INFO [MessagingDeliveryService] [Association] No associations on boot. Requerying for associations after 30 seconds. Dec 13 14:14:01.846294 systemd[1]: Created slice system-sshd.slice. Dec 13 14:14:01.848747 systemd[1]: Started sshd@0-172.31.18.231:22-139.178.89.65:49248.service. Dec 13 14:14:02.033588 sshd[2021]: Accepted publickey for core from 139.178.89.65 port 49248 ssh2: RSA SHA256:07jB2DPJgjjhgg3L8Uh349EZ0zHZFrUiRWNbK+Fdo0Q Dec 13 14:14:02.038718 sshd[2021]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:14:02.061250 systemd-logind[1810]: New session 1 of user core. Dec 13 14:14:02.064323 systemd[1]: Created slice user-500.slice. Dec 13 14:14:02.066856 systemd[1]: Starting user-runtime-dir@500.service... Dec 13 14:14:02.085762 systemd[1]: Finished user-runtime-dir@500.service. Dec 13 14:14:02.088986 systemd[1]: Starting user@500.service... Dec 13 14:14:02.096688 (systemd)[2024]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:14:02.284690 systemd[2024]: Queued start job for default target default.target. Dec 13 14:14:02.285752 systemd[2024]: Reached target paths.target. Dec 13 14:14:02.285804 systemd[2024]: Reached target sockets.target. Dec 13 14:14:02.285836 systemd[2024]: Reached target timers.target. Dec 13 14:14:02.285866 systemd[2024]: Reached target basic.target. Dec 13 14:14:02.286021 systemd[1]: Started user@500.service. Dec 13 14:14:02.287893 systemd[1]: Started session-1.scope. Dec 13 14:14:02.289291 systemd[2024]: Reached target default.target. Dec 13 14:14:02.289648 systemd[2024]: Startup finished in 181ms. Dec 13 14:14:02.442614 systemd[1]: Started sshd@1-172.31.18.231:22-139.178.89.65:49264.service. Dec 13 14:14:02.605954 sshd[2033]: Accepted publickey for core from 139.178.89.65 port 49264 ssh2: RSA SHA256:07jB2DPJgjjhgg3L8Uh349EZ0zHZFrUiRWNbK+Fdo0Q Dec 13 14:14:02.608442 sshd[2033]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:14:02.615807 systemd-logind[1810]: New session 2 of user core. Dec 13 14:14:02.617671 systemd[1]: Started session-2.scope. Dec 13 14:14:02.746631 sshd[2033]: pam_unix(sshd:session): session closed for user core Dec 13 14:14:02.752104 systemd-logind[1810]: Session 2 logged out. Waiting for processes to exit. Dec 13 14:14:02.752671 systemd[1]: session-2.scope: Deactivated successfully. Dec 13 14:14:02.753730 systemd[1]: sshd@1-172.31.18.231:22-139.178.89.65:49264.service: Deactivated successfully. Dec 13 14:14:02.755637 systemd-logind[1810]: Removed session 2. Dec 13 14:14:02.775079 systemd[1]: Started sshd@2-172.31.18.231:22-139.178.89.65:49280.service. Dec 13 14:14:02.937244 sshd[2039]: Accepted publickey for core from 139.178.89.65 port 49280 ssh2: RSA SHA256:07jB2DPJgjjhgg3L8Uh349EZ0zHZFrUiRWNbK+Fdo0Q Dec 13 14:14:02.940184 sshd[2039]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:14:02.948517 systemd[1]: Started session-3.scope. Dec 13 14:14:02.949731 systemd-logind[1810]: New session 3 of user core. Dec 13 14:14:03.068679 sshd[2039]: pam_unix(sshd:session): session closed for user core Dec 13 14:14:03.073617 systemd[1]: sshd@2-172.31.18.231:22-139.178.89.65:49280.service: Deactivated successfully. Dec 13 14:14:03.074849 systemd[1]: session-3.scope: Deactivated successfully. Dec 13 14:14:03.075993 systemd-logind[1810]: Session 3 logged out. Waiting for processes to exit. Dec 13 14:14:03.077778 systemd-logind[1810]: Removed session 3. Dec 13 14:14:03.096335 systemd[1]: Started sshd@3-172.31.18.231:22-139.178.89.65:49284.service. Dec 13 14:14:03.260808 sshd[2045]: Accepted publickey for core from 139.178.89.65 port 49284 ssh2: RSA SHA256:07jB2DPJgjjhgg3L8Uh349EZ0zHZFrUiRWNbK+Fdo0Q Dec 13 14:14:03.263221 sshd[2045]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:14:03.271987 systemd[1]: Started session-4.scope. Dec 13 14:14:03.272754 systemd-logind[1810]: New session 4 of user core. Dec 13 14:14:03.398788 sshd[2045]: pam_unix(sshd:session): session closed for user core Dec 13 14:14:03.404244 systemd[1]: sshd@3-172.31.18.231:22-139.178.89.65:49284.service: Deactivated successfully. Dec 13 14:14:03.405508 systemd[1]: session-4.scope: Deactivated successfully. Dec 13 14:14:03.406651 systemd-logind[1810]: Session 4 logged out. Waiting for processes to exit. Dec 13 14:14:03.408530 systemd-logind[1810]: Removed session 4. Dec 13 14:14:03.425298 systemd[1]: Started sshd@4-172.31.18.231:22-139.178.89.65:49300.service. Dec 13 14:14:03.587712 sshd[2051]: Accepted publickey for core from 139.178.89.65 port 49300 ssh2: RSA SHA256:07jB2DPJgjjhgg3L8Uh349EZ0zHZFrUiRWNbK+Fdo0Q Dec 13 14:14:03.590654 sshd[2051]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:14:03.597501 systemd-logind[1810]: New session 5 of user core. Dec 13 14:14:03.599155 systemd[1]: Started session-5.scope. Dec 13 14:14:03.720609 sudo[2054]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Dec 13 14:14:03.722459 sudo[2054]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:14:03.737635 dbus-daemon[1800]: avc: received setenforce notice (enforcing=1) Dec 13 14:14:03.739365 sudo[2054]: pam_unix(sudo:session): session closed for user root Dec 13 14:14:03.763353 sshd[2051]: pam_unix(sshd:session): session closed for user core Dec 13 14:14:03.768695 systemd-logind[1810]: Session 5 logged out. Waiting for processes to exit. Dec 13 14:14:03.769337 systemd[1]: sshd@4-172.31.18.231:22-139.178.89.65:49300.service: Deactivated successfully. Dec 13 14:14:03.770535 systemd[1]: session-5.scope: Deactivated successfully. Dec 13 14:14:03.772131 systemd-logind[1810]: Removed session 5. Dec 13 14:14:03.791061 systemd[1]: Started sshd@5-172.31.18.231:22-139.178.89.65:49314.service. Dec 13 14:14:03.957272 sshd[2058]: Accepted publickey for core from 139.178.89.65 port 49314 ssh2: RSA SHA256:07jB2DPJgjjhgg3L8Uh349EZ0zHZFrUiRWNbK+Fdo0Q Dec 13 14:14:03.959850 sshd[2058]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:14:03.968371 systemd[1]: Started session-6.scope. Dec 13 14:14:03.969220 systemd-logind[1810]: New session 6 of user core. Dec 13 14:14:04.075185 sudo[2062]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Dec 13 14:14:04.076527 sudo[2062]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:14:04.081678 sudo[2062]: pam_unix(sudo:session): session closed for user root Dec 13 14:14:04.090805 sudo[2061]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Dec 13 14:14:04.091338 sudo[2061]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:14:04.109583 systemd[1]: Stopping audit-rules.service... Dec 13 14:14:04.110000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 14:14:04.111860 auditctl[2065]: No rules Dec 13 14:14:04.113140 kernel: kauditd_printk_skb: 115 callbacks suppressed Dec 13 14:14:04.113252 kernel: audit: type=1305 audit(1734099244.110:209): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 14:14:04.113853 systemd[1]: audit-rules.service: Deactivated successfully. Dec 13 14:14:04.114192 systemd[1]: Stopped audit-rules.service. Dec 13 14:14:04.110000 audit[2065]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffd32b2ab0 a2=420 a3=0 items=0 ppid=1 pid=2065 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:14:04.117450 systemd[1]: Starting audit-rules.service... Dec 13 14:14:04.128726 kernel: audit: type=1300 audit(1734099244.110:209): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffd32b2ab0 a2=420 a3=0 items=0 ppid=1 pid=2065 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:14:04.110000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Dec 13 14:14:04.132713 kernel: audit: type=1327 audit(1734099244.110:209): proctitle=2F7362696E2F617564697463746C002D44 Dec 13 14:14:04.132808 kernel: audit: type=1131 audit(1734099244.112:210): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:14:04.112000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:14:04.155964 augenrules[2082]: No rules Dec 13 14:14:04.156000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:14:04.157591 systemd[1]: Finished audit-rules.service. Dec 13 14:14:04.164000 audit[2061]: USER_END pid=2061 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:14:04.165828 sudo[2061]: pam_unix(sudo:session): session closed for user root Dec 13 14:14:04.174195 kernel: audit: type=1130 audit(1734099244.156:211): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:14:04.174270 kernel: audit: type=1106 audit(1734099244.164:212): pid=2061 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:14:04.174314 kernel: audit: type=1104 audit(1734099244.164:213): pid=2061 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:14:04.164000 audit[2061]: CRED_DISP pid=2061 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:14:04.188797 sshd[2058]: pam_unix(sshd:session): session closed for user core Dec 13 14:14:04.189000 audit[2058]: USER_END pid=2058 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:14:04.202502 systemd[1]: sshd@5-172.31.18.231:22-139.178.89.65:49314.service: Deactivated successfully. Dec 13 14:14:04.189000 audit[2058]: CRED_DISP pid=2058 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:14:04.211142 kernel: audit: type=1106 audit(1734099244.189:214): pid=2058 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:14:04.211234 kernel: audit: type=1104 audit(1734099244.189:215): pid=2058 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:14:04.203702 systemd[1]: session-6.scope: Deactivated successfully. Dec 13 14:14:04.212269 systemd-logind[1810]: Session 6 logged out. Waiting for processes to exit. Dec 13 14:14:04.222257 kernel: audit: type=1131 audit(1734099244.202:216): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.18.231:22-139.178.89.65:49314 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:14:04.202000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.31.18.231:22-139.178.89.65:49314 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:14:04.219402 systemd[1]: Started sshd@6-172.31.18.231:22-139.178.89.65:49324.service. Dec 13 14:14:04.219000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.18.231:22-139.178.89.65:49324 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:14:04.227075 systemd-logind[1810]: Removed session 6. Dec 13 14:14:04.390000 audit[2088]: USER_ACCT pid=2088 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:14:04.392778 sshd[2088]: Accepted publickey for core from 139.178.89.65 port 49324 ssh2: RSA SHA256:07jB2DPJgjjhgg3L8Uh349EZ0zHZFrUiRWNbK+Fdo0Q Dec 13 14:14:04.392000 audit[2088]: CRED_ACQ pid=2088 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:14:04.393000 audit[2088]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc2e1af30 a2=3 a3=1 items=0 ppid=1 pid=2088 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:14:04.393000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:14:04.394110 sshd[2088]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:14:04.401670 systemd-logind[1810]: New session 7 of user core. Dec 13 14:14:04.402497 systemd[1]: Started session-7.scope. Dec 13 14:14:04.411000 audit[2088]: USER_START pid=2088 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:14:04.413000 audit[2090]: CRED_ACQ pid=2090 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:14:04.508000 audit[2091]: USER_ACCT pid=2091 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:14:04.509538 sudo[2091]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Dec 13 14:14:04.509000 audit[2091]: CRED_REFR pid=2091 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:14:04.510083 sudo[2091]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:14:04.512000 audit[2091]: USER_START pid=2091 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:14:04.557744 systemd[1]: Starting docker.service... Dec 13 14:14:04.633222 env[2101]: time="2024-12-13T14:14:04.633134071Z" level=info msg="Starting up" Dec 13 14:14:04.635848 env[2101]: time="2024-12-13T14:14:04.635797875Z" level=info msg="parsed scheme: \"unix\"" module=grpc Dec 13 14:14:04.636016 env[2101]: time="2024-12-13T14:14:04.635986061Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Dec 13 14:14:04.636177 env[2101]: time="2024-12-13T14:14:04.636144471Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Dec 13 14:14:04.636284 env[2101]: time="2024-12-13T14:14:04.636257190Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Dec 13 14:14:04.639233 env[2101]: time="2024-12-13T14:14:04.639172453Z" level=info msg="parsed scheme: \"unix\"" module=grpc Dec 13 14:14:04.639233 env[2101]: time="2024-12-13T14:14:04.639214651Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Dec 13 14:14:04.639433 env[2101]: time="2024-12-13T14:14:04.639248815Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Dec 13 14:14:04.639433 env[2101]: time="2024-12-13T14:14:04.639270939Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Dec 13 14:14:04.680979 env[2101]: time="2024-12-13T14:14:04.679789226Z" level=info msg="Loading containers: start." Dec 13 14:14:04.773000 audit[2131]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=2131 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:14:04.773000 audit[2131]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=116 a0=3 a1=ffffea513510 a2=0 a3=1 items=0 ppid=2101 pid=2131 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:14:04.773000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Dec 13 14:14:04.777000 audit[2133]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=2133 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:14:04.777000 audit[2133]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=124 a0=3 a1=fffffe7522f0 a2=0 a3=1 items=0 ppid=2101 pid=2133 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:14:04.777000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Dec 13 14:14:04.781000 audit[2135]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=2135 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:14:04.781000 audit[2135]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=ffffe46e99b0 a2=0 a3=1 items=0 ppid=2101 pid=2135 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:14:04.781000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Dec 13 14:14:04.785000 audit[2137]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=2137 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:14:04.785000 audit[2137]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=fffffb88daa0 a2=0 a3=1 items=0 ppid=2101 pid=2137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:14:04.785000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Dec 13 14:14:04.790000 audit[2139]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=2139 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:14:04.790000 audit[2139]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=fffffe8a7b90 a2=0 a3=1 items=0 ppid=2101 pid=2139 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:14:04.790000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Dec 13 14:14:04.829000 audit[2144]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=2144 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:14:04.829000 audit[2144]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffcd9cf7f0 a2=0 a3=1 items=0 ppid=2101 pid=2144 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:14:04.829000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Dec 13 14:14:04.840000 audit[2146]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=2146 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:14:04.840000 audit[2146]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffef5dc250 a2=0 a3=1 items=0 ppid=2101 pid=2146 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:14:04.840000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Dec 13 14:14:04.844000 audit[2148]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=2148 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:14:04.844000 audit[2148]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=212 a0=3 a1=ffffd0854d60 a2=0 a3=1 items=0 ppid=2101 pid=2148 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:14:04.844000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Dec 13 14:14:04.848000 audit[2150]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=2150 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:14:04.848000 audit[2150]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=308 a0=3 a1=ffffca06e210 a2=0 a3=1 items=0 ppid=2101 pid=2150 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:14:04.848000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 14:14:04.861000 audit[2154]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=2154 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:14:04.861000 audit[2154]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=ffffcb36e220 a2=0 a3=1 items=0 ppid=2101 pid=2154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:14:04.861000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Dec 13 14:14:04.872000 audit[2155]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=2155 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:14:04.872000 audit[2155]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=fffffdea7240 a2=0 a3=1 items=0 ppid=2101 pid=2155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:14:04.872000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 14:14:04.890457 kernel: Initializing XFRM netlink socket Dec 13 14:14:04.936062 env[2101]: time="2024-12-13T14:14:04.934681116Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Dec 13 14:14:04.937979 (udev-worker)[2111]: Network interface NamePolicy= disabled on kernel command line. Dec 13 14:14:04.966000 audit[2163]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=2163 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:14:04.966000 audit[2163]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=492 a0=3 a1=ffffc4afd1d0 a2=0 a3=1 items=0 ppid=2101 pid=2163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:14:04.966000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Dec 13 14:14:04.980000 audit[2166]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=2166 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:14:04.980000 audit[2166]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=288 a0=3 a1=fffff1d46900 a2=0 a3=1 items=0 ppid=2101 pid=2166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:14:04.980000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Dec 13 14:14:04.988000 audit[2169]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=2169 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:14:04.988000 audit[2169]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=ffffee2b7520 a2=0 a3=1 items=0 ppid=2101 pid=2169 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:14:04.988000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Dec 13 14:14:04.992000 audit[2171]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=2171 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:14:04.992000 audit[2171]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=fffff794f220 a2=0 a3=1 items=0 ppid=2101 pid=2171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:14:04.992000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Dec 13 14:14:04.996000 audit[2173]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=2173 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:14:04.996000 audit[2173]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=356 a0=3 a1=ffffd3415a40 a2=0 a3=1 items=0 ppid=2101 pid=2173 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:14:04.996000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Dec 13 14:14:05.000000 audit[2175]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=2175 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:14:05.000000 audit[2175]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=444 a0=3 a1=ffffe73a1440 a2=0 a3=1 items=0 ppid=2101 pid=2175 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:14:05.000000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Dec 13 14:14:05.004000 audit[2177]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=2177 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:14:05.004000 audit[2177]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=304 a0=3 a1=ffffe3d00c20 a2=0 a3=1 items=0 ppid=2101 pid=2177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:14:05.004000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Dec 13 14:14:05.016000 audit[2180]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=2180 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:14:05.016000 audit[2180]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=508 a0=3 a1=ffffeecb40a0 a2=0 a3=1 items=0 ppid=2101 pid=2180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:14:05.016000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Dec 13 14:14:05.021000 audit[2182]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=2182 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:14:05.021000 audit[2182]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=240 a0=3 a1=fffffc77b530 a2=0 a3=1 items=0 ppid=2101 pid=2182 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:14:05.021000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Dec 13 14:14:05.025000 audit[2184]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=2184 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:14:05.025000 audit[2184]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=428 a0=3 a1=ffffe4f1dd90 a2=0 a3=1 items=0 ppid=2101 pid=2184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:14:05.025000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Dec 13 14:14:05.030000 audit[2186]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=2186 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:14:05.030000 audit[2186]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffc61a8e40 a2=0 a3=1 items=0 ppid=2101 pid=2186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:14:05.030000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Dec 13 14:14:05.032268 systemd-networkd[1540]: docker0: Link UP Dec 13 14:14:05.045000 audit[2190]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=2190 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:14:05.045000 audit[2190]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=fffff66833a0 a2=0 a3=1 items=0 ppid=2101 pid=2190 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:14:05.045000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Dec 13 14:14:05.052000 audit[2191]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=2191 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:14:05.052000 audit[2191]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=fffff1fd9890 a2=0 a3=1 items=0 ppid=2101 pid=2191 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:14:05.052000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 14:14:05.054586 env[2101]: time="2024-12-13T14:14:05.054546837Z" level=info msg="Loading containers: done." Dec 13 14:14:05.081846 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck4139572671-merged.mount: Deactivated successfully. Dec 13 14:14:05.093597 env[2101]: time="2024-12-13T14:14:05.093544165Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Dec 13 14:14:05.094115 env[2101]: time="2024-12-13T14:14:05.094083975Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Dec 13 14:14:05.094393 env[2101]: time="2024-12-13T14:14:05.094367952Z" level=info msg="Daemon has completed initialization" Dec 13 14:14:05.115918 systemd[1]: Started docker.service. Dec 13 14:14:05.115000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:14:05.132866 env[2101]: time="2024-12-13T14:14:05.132718491Z" level=info msg="API listen on /run/docker.sock" Dec 13 14:14:06.347057 env[1818]: time="2024-12-13T14:14:06.346972918Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.29.12\"" Dec 13 14:14:06.951000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:14:06.951000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:14:06.951808 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Dec 13 14:14:06.952079 systemd[1]: Stopped kubelet.service. Dec 13 14:14:06.952188 systemd[1]: kubelet.service: Consumed 1.462s CPU time. Dec 13 14:14:06.956156 systemd[1]: Starting kubelet.service... Dec 13 14:14:06.996241 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3436471068.mount: Deactivated successfully. Dec 13 14:14:07.307000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:14:07.308882 systemd[1]: Started kubelet.service. Dec 13 14:14:07.459101 kubelet[2234]: E1213 14:14:07.459030 2234 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:14:07.470000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 14:14:07.470806 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:14:07.471117 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:14:09.187673 env[1818]: time="2024-12-13T14:14:09.187609640Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:14:09.194465 env[1818]: time="2024-12-13T14:14:09.194378527Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:50c86b7f73fdd28bacd4abf45260c9d3abc3b57eb038fa61fc45b5d0f2763e6f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:14:09.199195 env[1818]: time="2024-12-13T14:14:09.199132789Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:14:09.203706 env[1818]: time="2024-12-13T14:14:09.203637285Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:2804b1e7b9e08f3a3468f8fd2f6487c55968b9293ee51b9efb865b3298acfa26,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:14:09.205588 env[1818]: time="2024-12-13T14:14:09.205517489Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.29.12\" returns image reference \"sha256:50c86b7f73fdd28bacd4abf45260c9d3abc3b57eb038fa61fc45b5d0f2763e6f\"" Dec 13 14:14:09.222477 env[1818]: time="2024-12-13T14:14:09.222397067Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.29.12\"" Dec 13 14:14:11.440740 env[1818]: time="2024-12-13T14:14:11.440670880Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:14:11.449355 env[1818]: time="2024-12-13T14:14:11.449280782Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2d47abaa6ccc533f84ef74fff6d509de10bb040317351b45afe95a8021a1ddf7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:14:11.457128 env[1818]: time="2024-12-13T14:14:11.457070467Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.29.12\" returns image reference \"sha256:2d47abaa6ccc533f84ef74fff6d509de10bb040317351b45afe95a8021a1ddf7\"" Dec 13 14:14:11.458476 env[1818]: time="2024-12-13T14:14:11.455347834Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:14:11.461164 env[1818]: time="2024-12-13T14:14:11.461109049Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:e2f26a3f5ef3fd01f6330cab8b078cf303cfb6d36911a210d0915d535910e412,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:14:11.476120 env[1818]: time="2024-12-13T14:14:11.476059224Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.29.12\"" Dec 13 14:14:12.908209 env[1818]: time="2024-12-13T14:14:12.908143080Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:14:12.910699 env[1818]: time="2024-12-13T14:14:12.910637614Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ae633c52a23907b58f7a7867d2cccf3d3f5ebd8977beb6788e20fbecd3f446db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:14:12.914240 env[1818]: time="2024-12-13T14:14:12.914180482Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:14:12.917843 env[1818]: time="2024-12-13T14:14:12.917784028Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:ed66e2102f4705d45de7513decf3ac61879704984409323779d19e98b970568c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:14:12.919776 env[1818]: time="2024-12-13T14:14:12.919723403Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.29.12\" returns image reference \"sha256:ae633c52a23907b58f7a7867d2cccf3d3f5ebd8977beb6788e20fbecd3f446db\"" Dec 13 14:14:12.936403 env[1818]: time="2024-12-13T14:14:12.936314929Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.29.12\"" Dec 13 14:14:14.315845 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3575675846.mount: Deactivated successfully. Dec 13 14:14:15.106578 env[1818]: time="2024-12-13T14:14:15.106518819Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:14:15.112665 env[1818]: time="2024-12-13T14:14:15.112618684Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:768ee8cfd9311233d038d18430c18136e1ae4dd2e6de40fcf1c670bba2da6d06,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:14:15.117215 env[1818]: time="2024-12-13T14:14:15.117170207Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:14:15.120298 env[1818]: time="2024-12-13T14:14:15.120237597Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:bc761494b78fa152a759457f42bc9b86ee9d18f5929bb127bd5f72f8e2112c39,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:14:15.121456 env[1818]: time="2024-12-13T14:14:15.121376142Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.29.12\" returns image reference \"sha256:768ee8cfd9311233d038d18430c18136e1ae4dd2e6de40fcf1c670bba2da6d06\"" Dec 13 14:14:15.137074 env[1818]: time="2024-12-13T14:14:15.137004534Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\"" Dec 13 14:14:15.729409 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount680344522.mount: Deactivated successfully. Dec 13 14:14:17.144819 env[1818]: time="2024-12-13T14:14:17.144723050Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:14:17.151199 env[1818]: time="2024-12-13T14:14:17.150236496Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2437cf762177702dec2dfe99a09c37427a15af6d9a57c456b65352667c223d93,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:14:17.154454 env[1818]: time="2024-12-13T14:14:17.154346650Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:14:17.158194 env[1818]: time="2024-12-13T14:14:17.158128053Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:1eeb4c7316bacb1d4c8ead65571cd92dd21e27359f0d4917f1a5822a73b75db1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:14:17.160085 env[1818]: time="2024-12-13T14:14:17.160007464Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\" returns image reference \"sha256:2437cf762177702dec2dfe99a09c37427a15af6d9a57c456b65352667c223d93\"" Dec 13 14:14:17.175844 env[1818]: time="2024-12-13T14:14:17.175780546Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Dec 13 14:14:17.618680 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Dec 13 14:14:17.629327 kernel: kauditd_printk_skb: 88 callbacks suppressed Dec 13 14:14:17.629474 kernel: audit: type=1130 audit(1734099257.618:255): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:14:17.618000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:14:17.619008 systemd[1]: Stopped kubelet.service. Dec 13 14:14:17.621557 systemd[1]: Starting kubelet.service... Dec 13 14:14:17.637438 kernel: audit: type=1131 audit(1734099257.618:256): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:14:17.618000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:14:17.741244 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1963473310.mount: Deactivated successfully. Dec 13 14:14:17.759470 env[1818]: time="2024-12-13T14:14:17.758429103Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:14:17.766488 env[1818]: time="2024-12-13T14:14:17.764647312Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:829e9de338bd5fdd3f16f68f83a9fb288fbc8453e881e5d5cfd0f6f2ff72b43e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:14:17.770896 env[1818]: time="2024-12-13T14:14:17.770832056Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:14:17.774346 env[1818]: time="2024-12-13T14:14:17.774283618Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:14:17.775149 env[1818]: time="2024-12-13T14:14:17.775100557Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:829e9de338bd5fdd3f16f68f83a9fb288fbc8453e881e5d5cfd0f6f2ff72b43e\"" Dec 13 14:14:17.796967 env[1818]: time="2024-12-13T14:14:17.796896561Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.10-0\"" Dec 13 14:14:17.933198 systemd[1]: Started kubelet.service. Dec 13 14:14:17.932000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:14:17.942462 kernel: audit: type=1130 audit(1734099257.932:257): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:14:18.017994 kubelet[2277]: E1213 14:14:18.017885 2277 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:14:18.021915 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:14:18.022233 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:14:18.021000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 14:14:18.030488 kernel: audit: type=1131 audit(1734099258.021:258): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 14:14:18.377774 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount913339113.mount: Deactivated successfully. Dec 13 14:14:22.471732 env[1818]: time="2024-12-13T14:14:22.471651545Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.10-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:14:22.476000 env[1818]: time="2024-12-13T14:14:22.475945759Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:79f8d13ae8b8839cadfb2f83416935f5184206d386028e2d1263577f0ab3620b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:14:22.481042 env[1818]: time="2024-12-13T14:14:22.480995651Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.10-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:14:22.487627 env[1818]: time="2024-12-13T14:14:22.487580130Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:22f892d7672adc0b9c86df67792afdb8b2dc08880f49f669eaaa59c47d7908c2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:14:22.489790 env[1818]: time="2024-12-13T14:14:22.489732358Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.10-0\" returns image reference \"sha256:79f8d13ae8b8839cadfb2f83416935f5184206d386028e2d1263577f0ab3620b\"" Dec 13 14:14:23.788000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:14:23.788973 systemd[1]: systemd-hostnamed.service: Deactivated successfully. Dec 13 14:14:23.797458 kernel: audit: type=1131 audit(1734099263.788:259): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:14:23.835000 audit: BPF prog-id=46 op=UNLOAD Dec 13 14:14:23.835000 audit: BPF prog-id=45 op=UNLOAD Dec 13 14:14:23.840218 kernel: audit: type=1334 audit(1734099263.835:260): prog-id=46 op=UNLOAD Dec 13 14:14:23.840290 kernel: audit: type=1334 audit(1734099263.835:261): prog-id=45 op=UNLOAD Dec 13 14:14:23.840342 kernel: audit: type=1334 audit(1734099263.835:262): prog-id=44 op=UNLOAD Dec 13 14:14:23.835000 audit: BPF prog-id=44 op=UNLOAD Dec 13 14:14:28.117000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:14:28.118629 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 3. Dec 13 14:14:28.118955 systemd[1]: Stopped kubelet.service. Dec 13 14:14:28.117000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:14:28.135768 systemd[1]: Starting kubelet.service... Dec 13 14:14:28.135934 kernel: audit: type=1130 audit(1734099268.117:263): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:14:28.136002 kernel: audit: type=1131 audit(1734099268.117:264): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:14:28.395127 systemd[1]: Started kubelet.service. Dec 13 14:14:28.396000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:14:28.409477 kernel: audit: type=1130 audit(1734099268.396:265): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:14:28.492248 kubelet[2350]: E1213 14:14:28.492182 2350 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:14:28.495000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 14:14:28.496587 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:14:28.496905 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:14:28.505619 kernel: audit: type=1131 audit(1734099268.495:266): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 14:14:28.842321 systemd[1]: Stopped kubelet.service. Dec 13 14:14:28.841000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:14:28.850194 systemd[1]: Starting kubelet.service... Dec 13 14:14:28.841000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:14:28.859467 kernel: audit: type=1130 audit(1734099268.841:267): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:14:28.859592 kernel: audit: type=1131 audit(1734099268.841:268): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:14:28.895024 systemd[1]: Reloading. Dec 13 14:14:29.079747 /usr/lib/systemd/system-generators/torcx-generator[2384]: time="2024-12-13T14:14:29Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:14:29.080583 /usr/lib/systemd/system-generators/torcx-generator[2384]: time="2024-12-13T14:14:29Z" level=info msg="torcx already run" Dec 13 14:14:29.259793 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:14:29.260255 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:14:29.299297 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:14:29.458000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.475406 kernel: audit: type=1400 audit(1734099269.458:269): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.475539 kernel: audit: type=1400 audit(1734099269.458:270): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.458000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.458000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.482573 kernel: audit: type=1400 audit(1734099269.458:271): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.482682 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Dec 13 14:14:29.458000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.491237 kernel: audit: type=1400 audit(1734099269.458:272): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.491304 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Dec 13 14:14:29.458000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.500325 kernel: audit: type=1400 audit(1734099269.458:273): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.500380 kernel: audit: backlog limit exceeded Dec 13 14:14:29.458000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.458000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.458000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.458000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.465000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.465000 audit: BPF prog-id=49 op=LOAD Dec 13 14:14:29.465000 audit: BPF prog-id=40 op=UNLOAD Dec 13 14:14:29.466000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.466000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.466000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.466000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.466000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.466000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.466000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.466000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.466000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.466000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.466000 audit: BPF prog-id=50 op=LOAD Dec 13 14:14:29.466000 audit: BPF prog-id=47 op=UNLOAD Dec 13 14:14:29.467000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.467000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.467000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.467000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.467000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.467000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.467000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.467000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.467000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.474000 audit: BPF prog-id=51 op=LOAD Dec 13 14:14:29.474000 audit: BPF prog-id=30 op=UNLOAD Dec 13 14:14:29.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.474000 audit: BPF prog-id=52 op=LOAD Dec 13 14:14:29.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.474000 audit: BPF prog-id=53 op=LOAD Dec 13 14:14:29.474000 audit: BPF prog-id=31 op=UNLOAD Dec 13 14:14:29.474000 audit: BPF prog-id=32 op=UNLOAD Dec 13 14:14:29.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.474000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.481000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.500000 audit: BPF prog-id=33 op=UNLOAD Dec 13 14:14:29.502000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.502000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.502000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.502000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.502000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.502000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.503000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.503000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.503000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.503000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.503000 audit: BPF prog-id=55 op=LOAD Dec 13 14:14:29.503000 audit: BPF prog-id=41 op=UNLOAD Dec 13 14:14:29.503000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.503000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.503000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.503000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.503000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.503000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.503000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.503000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.503000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.503000 audit: BPF prog-id=56 op=LOAD Dec 13 14:14:29.503000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.503000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.503000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.503000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.503000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.503000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.503000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.503000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.503000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.503000 audit: BPF prog-id=57 op=LOAD Dec 13 14:14:29.504000 audit: BPF prog-id=42 op=UNLOAD Dec 13 14:14:29.504000 audit: BPF prog-id=43 op=UNLOAD Dec 13 14:14:29.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.508000 audit: BPF prog-id=58 op=LOAD Dec 13 14:14:29.508000 audit: BPF prog-id=39 op=UNLOAD Dec 13 14:14:29.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.510000 audit: BPF prog-id=59 op=LOAD Dec 13 14:14:29.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.510000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.510000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.510000 audit: BPF prog-id=60 op=LOAD Dec 13 14:14:29.510000 audit: BPF prog-id=34 op=UNLOAD Dec 13 14:14:29.510000 audit: BPF prog-id=35 op=UNLOAD Dec 13 14:14:29.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.514000 audit: BPF prog-id=61 op=LOAD Dec 13 14:14:29.514000 audit: BPF prog-id=36 op=UNLOAD Dec 13 14:14:29.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.514000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.514000 audit: BPF prog-id=62 op=LOAD Dec 13 14:14:29.514000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.515000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.515000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.515000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.515000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.515000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.515000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.515000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.515000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:29.515000 audit: BPF prog-id=63 op=LOAD Dec 13 14:14:29.515000 audit: BPF prog-id=37 op=UNLOAD Dec 13 14:14:29.515000 audit: BPF prog-id=38 op=UNLOAD Dec 13 14:14:29.547000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:14:29.548712 systemd[1]: Started kubelet.service. Dec 13 14:14:29.562057 systemd[1]: Stopping kubelet.service... Dec 13 14:14:29.564000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:14:29.565043 systemd[1]: kubelet.service: Deactivated successfully. Dec 13 14:14:29.565481 systemd[1]: Stopped kubelet.service. Dec 13 14:14:29.569061 systemd[1]: Starting kubelet.service... Dec 13 14:14:29.654376 amazon-ssm-agent[1834]: 2024-12-13 14:14:29 INFO [MessagingDeliveryService] [Association] Schedule manager refreshed with 0 associations, 0 new associations associated Dec 13 14:14:29.838647 systemd[1]: Started kubelet.service. Dec 13 14:14:29.838000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:14:29.945763 kubelet[2449]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 14:14:29.945763 kubelet[2449]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Dec 13 14:14:29.945763 kubelet[2449]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 14:14:29.946347 kubelet[2449]: I1213 14:14:29.945874 2449 server.go:204] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Dec 13 14:14:31.508487 kubelet[2449]: I1213 14:14:31.508444 2449 server.go:487] "Kubelet version" kubeletVersion="v1.29.2" Dec 13 14:14:31.509073 kubelet[2449]: I1213 14:14:31.509048 2449 server.go:489] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Dec 13 14:14:31.510104 kubelet[2449]: I1213 14:14:31.510058 2449 server.go:919] "Client rotation is on, will bootstrap in background" Dec 13 14:14:31.564298 kubelet[2449]: E1213 14:14:31.564259 2449 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://172.31.18.231:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 172.31.18.231:6443: connect: connection refused Dec 13 14:14:31.564588 kubelet[2449]: I1213 14:14:31.564560 2449 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 14:14:31.578837 kubelet[2449]: I1213 14:14:31.578800 2449 server.go:745] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Dec 13 14:14:31.579527 kubelet[2449]: I1213 14:14:31.579504 2449 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Dec 13 14:14:31.579978 kubelet[2449]: I1213 14:14:31.579950 2449 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Dec 13 14:14:31.580182 kubelet[2449]: I1213 14:14:31.580157 2449 topology_manager.go:138] "Creating topology manager with none policy" Dec 13 14:14:31.580324 kubelet[2449]: I1213 14:14:31.580303 2449 container_manager_linux.go:301] "Creating device plugin manager" Dec 13 14:14:31.580625 kubelet[2449]: I1213 14:14:31.580604 2449 state_mem.go:36] "Initialized new in-memory state store" Dec 13 14:14:31.585643 kubelet[2449]: I1213 14:14:31.585613 2449 kubelet.go:396] "Attempting to sync node with API server" Dec 13 14:14:31.585805 kubelet[2449]: I1213 14:14:31.585783 2449 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Dec 13 14:14:31.585940 kubelet[2449]: I1213 14:14:31.585918 2449 kubelet.go:312] "Adding apiserver pod source" Dec 13 14:14:31.586094 kubelet[2449]: I1213 14:14:31.586073 2449 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Dec 13 14:14:31.587693 kubelet[2449]: I1213 14:14:31.587660 2449 kuberuntime_manager.go:258] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Dec 13 14:14:31.588431 kubelet[2449]: I1213 14:14:31.588386 2449 kubelet.go:809] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Dec 13 14:14:31.588658 kubelet[2449]: W1213 14:14:31.588638 2449 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Dec 13 14:14:31.589793 kubelet[2449]: I1213 14:14:31.589760 2449 server.go:1256] "Started kubelet" Dec 13 14:14:31.590130 kubelet[2449]: W1213 14:14:31.590076 2449 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Service: Get "https://172.31.18.231:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.31.18.231:6443: connect: connection refused Dec 13 14:14:31.590266 kubelet[2449]: E1213 14:14:31.590244 2449 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://172.31.18.231:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.31.18.231:6443: connect: connection refused Dec 13 14:14:31.590563 kubelet[2449]: W1213 14:14:31.590517 2449 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Node: Get "https://172.31.18.231:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-18-231&limit=500&resourceVersion=0": dial tcp 172.31.18.231:6443: connect: connection refused Dec 13 14:14:31.590700 kubelet[2449]: E1213 14:14:31.590678 2449 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://172.31.18.231:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-18-231&limit=500&resourceVersion=0": dial tcp 172.31.18.231:6443: connect: connection refused Dec 13 14:14:31.603000 audit[2449]: AVC avc: denied { mac_admin } for pid=2449 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:31.603000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:14:31.603000 audit[2449]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000b90990 a1=400095f3b0 a2=4000b90960 a3=25 items=0 ppid=1 pid=2449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:14:31.603000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:14:31.605912 kubelet[2449]: I1213 14:14:31.605876 2449 kubelet.go:1417] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Dec 13 14:14:31.604000 audit[2449]: AVC avc: denied { mac_admin } for pid=2449 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:31.604000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:14:31.604000 audit[2449]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40009da8c0 a1=400095f3c8 a2=4000b90a20 a3=25 items=0 ppid=1 pid=2449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:14:31.604000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:14:31.606476 kubelet[2449]: I1213 14:14:31.606447 2449 kubelet.go:1421] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Dec 13 14:14:31.608089 kubelet[2449]: I1213 14:14:31.608052 2449 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Dec 13 14:14:31.609155 kubelet[2449]: I1213 14:14:31.609105 2449 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Dec 13 14:14:31.610623 kubelet[2449]: I1213 14:14:31.610575 2449 server.go:461] "Adding debug handlers to kubelet server" Dec 13 14:14:31.612390 kubelet[2449]: I1213 14:14:31.612334 2449 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Dec 13 14:14:31.612744 kubelet[2449]: I1213 14:14:31.612705 2449 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Dec 13 14:14:31.614000 audit[2459]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=2459 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:14:31.614000 audit[2459]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffebda7fa0 a2=0 a3=1 items=0 ppid=2449 pid=2459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:14:31.614000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 14:14:31.617996 kubelet[2449]: E1213 14:14:31.617924 2449 event.go:355] "Unable to write event (may retry after sleeping)" err="Post \"https://172.31.18.231:6443/api/v1/namespaces/default/events\": dial tcp 172.31.18.231:6443: connect: connection refused" event="&Event{ObjectMeta:{ip-172-31-18-231.1810c219905e7d4b default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:ip-172-31-18-231,UID:ip-172-31-18-231,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:ip-172-31-18-231,},FirstTimestamp:2024-12-13 14:14:31.589723467 +0000 UTC m=+1.740625708,LastTimestamp:2024-12-13 14:14:31.589723467 +0000 UTC m=+1.740625708,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:ip-172-31-18-231,}" Dec 13 14:14:31.618394 kubelet[2449]: E1213 14:14:31.618345 2449 kubelet.go:1462] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Dec 13 14:14:31.619176 kubelet[2449]: I1213 14:14:31.619134 2449 volume_manager.go:291] "Starting Kubelet Volume Manager" Dec 13 14:14:31.619348 kubelet[2449]: I1213 14:14:31.619315 2449 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Dec 13 14:14:31.620634 kubelet[2449]: I1213 14:14:31.620593 2449 reconciler_new.go:29] "Reconciler: start to sync state" Dec 13 14:14:31.621207 kubelet[2449]: W1213 14:14:31.621134 2449 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.CSIDriver: Get "https://172.31.18.231:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.18.231:6443: connect: connection refused Dec 13 14:14:31.621317 kubelet[2449]: E1213 14:14:31.621221 2449 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://172.31.18.231:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.18.231:6443: connect: connection refused Dec 13 14:14:31.622223 kubelet[2449]: E1213 14:14:31.622179 2449 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.18.231:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-18-231?timeout=10s\": dial tcp 172.31.18.231:6443: connect: connection refused" interval="200ms" Dec 13 14:14:31.623639 kubelet[2449]: I1213 14:14:31.623587 2449 factory.go:221] Registration of the systemd container factory successfully Dec 13 14:14:31.623796 kubelet[2449]: I1213 14:14:31.623755 2449 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Dec 13 14:14:31.625000 audit[2460]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=2460 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:14:31.625000 audit[2460]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc3a9c120 a2=0 a3=1 items=0 ppid=2449 pid=2460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:14:31.625000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 14:14:31.627329 kubelet[2449]: I1213 14:14:31.627135 2449 factory.go:221] Registration of the containerd container factory successfully Dec 13 14:14:31.638000 audit[2464]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=2464 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:14:31.638000 audit[2464]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffd26e3310 a2=0 a3=1 items=0 ppid=2449 pid=2464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:14:31.638000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:14:31.645000 audit[2466]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=2466 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:14:31.645000 audit[2466]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffd7d42db0 a2=0 a3=1 items=0 ppid=2449 pid=2466 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:14:31.645000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:14:31.665000 audit[2469]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=2469 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:14:31.665000 audit[2469]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=924 a0=3 a1=ffffe3d6cfe0 a2=0 a3=1 items=0 ppid=2449 pid=2469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:14:31.665000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Dec 13 14:14:31.667478 kubelet[2449]: I1213 14:14:31.667438 2449 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Dec 13 14:14:31.669000 audit[2472]: NETFILTER_CFG table=mangle:31 family=2 entries=1 op=nft_register_chain pid=2472 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:14:31.669000 audit[2472]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff997f870 a2=0 a3=1 items=0 ppid=2449 pid=2472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:14:31.669000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 14:14:31.670000 audit[2470]: NETFILTER_CFG table=mangle:32 family=10 entries=2 op=nft_register_chain pid=2470 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:14:31.670000 audit[2470]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffd8e2a4e0 a2=0 a3=1 items=0 ppid=2449 pid=2470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:14:31.670000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 14:14:31.672540 kubelet[2449]: I1213 14:14:31.672507 2449 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Dec 13 14:14:31.672710 kubelet[2449]: I1213 14:14:31.672688 2449 status_manager.go:217] "Starting to sync pod status with apiserver" Dec 13 14:14:31.672841 kubelet[2449]: I1213 14:14:31.672819 2449 kubelet.go:2329] "Starting kubelet main sync loop" Dec 13 14:14:31.673017 kubelet[2449]: E1213 14:14:31.672994 2449 kubelet.go:2353] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Dec 13 14:14:31.672000 audit[2473]: NETFILTER_CFG table=nat:33 family=2 entries=1 op=nft_register_chain pid=2473 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:14:31.672000 audit[2473]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe0e293b0 a2=0 a3=1 items=0 ppid=2449 pid=2473 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:14:31.672000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 14:14:31.674000 audit[2474]: NETFILTER_CFG table=mangle:34 family=10 entries=1 op=nft_register_chain pid=2474 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:14:31.674000 audit[2474]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc1a41210 a2=0 a3=1 items=0 ppid=2449 pid=2474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:14:31.674000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 14:14:31.675000 audit[2475]: NETFILTER_CFG table=filter:35 family=2 entries=1 op=nft_register_chain pid=2475 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:14:31.675000 audit[2475]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffeb08fc20 a2=0 a3=1 items=0 ppid=2449 pid=2475 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:14:31.675000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 14:14:31.678383 kubelet[2449]: I1213 14:14:31.678342 2449 cpu_manager.go:214] "Starting CPU manager" policy="none" Dec 13 14:14:31.678383 kubelet[2449]: I1213 14:14:31.678381 2449 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Dec 13 14:14:31.678602 kubelet[2449]: I1213 14:14:31.678451 2449 state_mem.go:36] "Initialized new in-memory state store" Dec 13 14:14:31.677000 audit[2476]: NETFILTER_CFG table=nat:36 family=10 entries=2 op=nft_register_chain pid=2476 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:14:31.677000 audit[2476]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=ffffca118110 a2=0 a3=1 items=0 ppid=2449 pid=2476 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:14:31.677000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 14:14:31.679000 audit[2477]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=2477 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:14:31.679000 audit[2477]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffd92000a0 a2=0 a3=1 items=0 ppid=2449 pid=2477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:14:31.679000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 14:14:31.684630 kubelet[2449]: W1213 14:14:31.683085 2449 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.RuntimeClass: Get "https://172.31.18.231:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.18.231:6443: connect: connection refused Dec 13 14:14:31.684630 kubelet[2449]: E1213 14:14:31.683170 2449 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://172.31.18.231:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.18.231:6443: connect: connection refused Dec 13 14:14:31.685249 kubelet[2449]: I1213 14:14:31.685201 2449 policy_none.go:49] "None policy: Start" Dec 13 14:14:31.686341 kubelet[2449]: I1213 14:14:31.686310 2449 memory_manager.go:170] "Starting memorymanager" policy="None" Dec 13 14:14:31.686613 kubelet[2449]: I1213 14:14:31.686591 2449 state_mem.go:35] "Initializing new in-memory state store" Dec 13 14:14:31.697588 systemd[1]: Created slice kubepods.slice. Dec 13 14:14:31.707595 systemd[1]: Created slice kubepods-burstable.slice. Dec 13 14:14:31.713901 systemd[1]: Created slice kubepods-besteffort.slice. Dec 13 14:14:31.722016 kubelet[2449]: I1213 14:14:31.721955 2449 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Dec 13 14:14:31.720000 audit[2449]: AVC avc: denied { mac_admin } for pid=2449 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:31.720000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:14:31.720000 audit[2449]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000dd01e0 a1=4000799a10 a2=4000dd01b0 a3=25 items=0 ppid=1 pid=2449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:14:31.720000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:14:31.722545 kubelet[2449]: I1213 14:14:31.722115 2449 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Dec 13 14:14:31.722545 kubelet[2449]: I1213 14:14:31.722451 2449 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Dec 13 14:14:31.726110 kubelet[2449]: I1213 14:14:31.725880 2449 kubelet_node_status.go:73] "Attempting to register node" node="ip-172-31-18-231" Dec 13 14:14:31.727202 kubelet[2449]: E1213 14:14:31.727155 2449 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://172.31.18.231:6443/api/v1/nodes\": dial tcp 172.31.18.231:6443: connect: connection refused" node="ip-172-31-18-231" Dec 13 14:14:31.728242 kubelet[2449]: E1213 14:14:31.728210 2449 eviction_manager.go:282] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ip-172-31-18-231\" not found" Dec 13 14:14:31.773566 kubelet[2449]: I1213 14:14:31.773450 2449 topology_manager.go:215] "Topology Admit Handler" podUID="ca3b994e64a190bf87289de9f3f7d15d" podNamespace="kube-system" podName="kube-apiserver-ip-172-31-18-231" Dec 13 14:14:31.777520 kubelet[2449]: I1213 14:14:31.777485 2449 topology_manager.go:215] "Topology Admit Handler" podUID="3e8d3657146926bece42f1354f3006d4" podNamespace="kube-system" podName="kube-controller-manager-ip-172-31-18-231" Dec 13 14:14:31.780037 kubelet[2449]: I1213 14:14:31.780004 2449 topology_manager.go:215] "Topology Admit Handler" podUID="06a9d235d0d5a909753e4080c0ed3d93" podNamespace="kube-system" podName="kube-scheduler-ip-172-31-18-231" Dec 13 14:14:31.789584 systemd[1]: Created slice kubepods-burstable-podca3b994e64a190bf87289de9f3f7d15d.slice. Dec 13 14:14:31.805014 systemd[1]: Created slice kubepods-burstable-pod3e8d3657146926bece42f1354f3006d4.slice. Dec 13 14:14:31.814232 systemd[1]: Created slice kubepods-burstable-pod06a9d235d0d5a909753e4080c0ed3d93.slice. Dec 13 14:14:31.822139 kubelet[2449]: I1213 14:14:31.822103 2449 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/ca3b994e64a190bf87289de9f3f7d15d-k8s-certs\") pod \"kube-apiserver-ip-172-31-18-231\" (UID: \"ca3b994e64a190bf87289de9f3f7d15d\") " pod="kube-system/kube-apiserver-ip-172-31-18-231" Dec 13 14:14:31.822400 kubelet[2449]: I1213 14:14:31.822375 2449 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/ca3b994e64a190bf87289de9f3f7d15d-usr-share-ca-certificates\") pod \"kube-apiserver-ip-172-31-18-231\" (UID: \"ca3b994e64a190bf87289de9f3f7d15d\") " pod="kube-system/kube-apiserver-ip-172-31-18-231" Dec 13 14:14:31.822591 kubelet[2449]: I1213 14:14:31.822567 2449 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/3e8d3657146926bece42f1354f3006d4-kubeconfig\") pod \"kube-controller-manager-ip-172-31-18-231\" (UID: \"3e8d3657146926bece42f1354f3006d4\") " pod="kube-system/kube-controller-manager-ip-172-31-18-231" Dec 13 14:14:31.822783 kubelet[2449]: I1213 14:14:31.822739 2449 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/06a9d235d0d5a909753e4080c0ed3d93-kubeconfig\") pod \"kube-scheduler-ip-172-31-18-231\" (UID: \"06a9d235d0d5a909753e4080c0ed3d93\") " pod="kube-system/kube-scheduler-ip-172-31-18-231" Dec 13 14:14:31.822859 kubelet[2449]: I1213 14:14:31.822821 2449 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/ca3b994e64a190bf87289de9f3f7d15d-ca-certs\") pod \"kube-apiserver-ip-172-31-18-231\" (UID: \"ca3b994e64a190bf87289de9f3f7d15d\") " pod="kube-system/kube-apiserver-ip-172-31-18-231" Dec 13 14:14:31.822922 kubelet[2449]: I1213 14:14:31.822879 2449 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/3e8d3657146926bece42f1354f3006d4-ca-certs\") pod \"kube-controller-manager-ip-172-31-18-231\" (UID: \"3e8d3657146926bece42f1354f3006d4\") " pod="kube-system/kube-controller-manager-ip-172-31-18-231" Dec 13 14:14:31.823005 kubelet[2449]: I1213 14:14:31.822951 2449 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/3e8d3657146926bece42f1354f3006d4-flexvolume-dir\") pod \"kube-controller-manager-ip-172-31-18-231\" (UID: \"3e8d3657146926bece42f1354f3006d4\") " pod="kube-system/kube-controller-manager-ip-172-31-18-231" Dec 13 14:14:31.823066 kubelet[2449]: I1213 14:14:31.823014 2449 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/3e8d3657146926bece42f1354f3006d4-k8s-certs\") pod \"kube-controller-manager-ip-172-31-18-231\" (UID: \"3e8d3657146926bece42f1354f3006d4\") " pod="kube-system/kube-controller-manager-ip-172-31-18-231" Dec 13 14:14:31.823127 kubelet[2449]: I1213 14:14:31.823069 2449 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/3e8d3657146926bece42f1354f3006d4-usr-share-ca-certificates\") pod \"kube-controller-manager-ip-172-31-18-231\" (UID: \"3e8d3657146926bece42f1354f3006d4\") " pod="kube-system/kube-controller-manager-ip-172-31-18-231" Dec 13 14:14:31.823279 kubelet[2449]: E1213 14:14:31.823243 2449 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.18.231:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-18-231?timeout=10s\": dial tcp 172.31.18.231:6443: connect: connection refused" interval="400ms" Dec 13 14:14:31.929839 kubelet[2449]: I1213 14:14:31.929805 2449 kubelet_node_status.go:73] "Attempting to register node" node="ip-172-31-18-231" Dec 13 14:14:31.930486 kubelet[2449]: E1213 14:14:31.930459 2449 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://172.31.18.231:6443/api/v1/nodes\": dial tcp 172.31.18.231:6443: connect: connection refused" node="ip-172-31-18-231" Dec 13 14:14:32.103437 env[1818]: time="2024-12-13T14:14:32.102848729Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ip-172-31-18-231,Uid:ca3b994e64a190bf87289de9f3f7d15d,Namespace:kube-system,Attempt:0,}" Dec 13 14:14:32.112355 env[1818]: time="2024-12-13T14:14:32.112198762Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ip-172-31-18-231,Uid:3e8d3657146926bece42f1354f3006d4,Namespace:kube-system,Attempt:0,}" Dec 13 14:14:32.119533 env[1818]: time="2024-12-13T14:14:32.119470770Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ip-172-31-18-231,Uid:06a9d235d0d5a909753e4080c0ed3d93,Namespace:kube-system,Attempt:0,}" Dec 13 14:14:32.224185 kubelet[2449]: E1213 14:14:32.224126 2449 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.18.231:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-18-231?timeout=10s\": dial tcp 172.31.18.231:6443: connect: connection refused" interval="800ms" Dec 13 14:14:32.333148 kubelet[2449]: I1213 14:14:32.333098 2449 kubelet_node_status.go:73] "Attempting to register node" node="ip-172-31-18-231" Dec 13 14:14:32.333634 kubelet[2449]: E1213 14:14:32.333594 2449 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://172.31.18.231:6443/api/v1/nodes\": dial tcp 172.31.18.231:6443: connect: connection refused" node="ip-172-31-18-231" Dec 13 14:14:32.633967 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3878855885.mount: Deactivated successfully. Dec 13 14:14:32.650745 env[1818]: time="2024-12-13T14:14:32.650675263Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:14:32.653098 env[1818]: time="2024-12-13T14:14:32.653040255Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:14:32.659447 env[1818]: time="2024-12-13T14:14:32.659383451Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:14:32.662558 env[1818]: time="2024-12-13T14:14:32.662476800Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:14:32.664409 env[1818]: time="2024-12-13T14:14:32.664346101Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:14:32.669101 env[1818]: time="2024-12-13T14:14:32.669053549Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:14:32.671120 env[1818]: time="2024-12-13T14:14:32.671079264Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:14:32.673507 env[1818]: time="2024-12-13T14:14:32.673462881Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:14:32.677799 env[1818]: time="2024-12-13T14:14:32.677752208Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:14:32.682299 env[1818]: time="2024-12-13T14:14:32.682228203Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:14:32.688697 env[1818]: time="2024-12-13T14:14:32.688644109Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:14:32.690264 env[1818]: time="2024-12-13T14:14:32.690222903Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:14:32.715364 kubelet[2449]: W1213 14:14:32.715262 2449 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Node: Get "https://172.31.18.231:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-18-231&limit=500&resourceVersion=0": dial tcp 172.31.18.231:6443: connect: connection refused Dec 13 14:14:32.715925 kubelet[2449]: E1213 14:14:32.715373 2449 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://172.31.18.231:6443/api/v1/nodes?fieldSelector=metadata.name%3Dip-172-31-18-231&limit=500&resourceVersion=0": dial tcp 172.31.18.231:6443: connect: connection refused Dec 13 14:14:32.734862 kubelet[2449]: W1213 14:14:32.734782 2449 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.CSIDriver: Get "https://172.31.18.231:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.18.231:6443: connect: connection refused Dec 13 14:14:32.735067 kubelet[2449]: E1213 14:14:32.734874 2449 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://172.31.18.231:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.31.18.231:6443: connect: connection refused Dec 13 14:14:32.744746 env[1818]: time="2024-12-13T14:14:32.744555396Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:14:32.744746 env[1818]: time="2024-12-13T14:14:32.744671141Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:14:32.744980 env[1818]: time="2024-12-13T14:14:32.744722923Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:14:32.766447 env[1818]: time="2024-12-13T14:14:32.745171356Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/89c4331aec2d93b6b898d6e2e4ca0d445d41a8f6125b6365274fe3f99a72a95e pid=2488 runtime=io.containerd.runc.v2 Dec 13 14:14:32.789284 env[1818]: time="2024-12-13T14:14:32.788897811Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:14:32.789284 env[1818]: time="2024-12-13T14:14:32.788971518Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:14:32.789284 env[1818]: time="2024-12-13T14:14:32.788998579Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:14:32.790047 env[1818]: time="2024-12-13T14:14:32.789952892Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1c7ff81d36972557022972248d6026d3078b1dc2ebbf8b371f6dff12a3f16cf2 pid=2518 runtime=io.containerd.runc.v2 Dec 13 14:14:32.790496 env[1818]: time="2024-12-13T14:14:32.789153937Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:14:32.790738 env[1818]: time="2024-12-13T14:14:32.790644023Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:14:32.791181 env[1818]: time="2024-12-13T14:14:32.790698349Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:14:32.791813 env[1818]: time="2024-12-13T14:14:32.791689792Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/628643ed321b59b8bf83e017c38d55997cd9b43fd25e53fa4cf988f61858a040 pid=2511 runtime=io.containerd.runc.v2 Dec 13 14:14:32.816558 systemd[1]: Started cri-containerd-89c4331aec2d93b6b898d6e2e4ca0d445d41a8f6125b6365274fe3f99a72a95e.scope. Dec 13 14:14:32.840453 systemd[1]: Started cri-containerd-1c7ff81d36972557022972248d6026d3078b1dc2ebbf8b371f6dff12a3f16cf2.scope. Dec 13 14:14:32.863866 systemd[1]: Started cri-containerd-628643ed321b59b8bf83e017c38d55997cd9b43fd25e53fa4cf988f61858a040.scope. Dec 13 14:14:32.866000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:32.866000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:32.866000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:32.866000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:32.866000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:32.866000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:32.866000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:32.866000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:32.866000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:32.867000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:32.867000 audit: BPF prog-id=64 op=LOAD Dec 13 14:14:32.867000 audit[2512]: AVC avc: denied { bpf } for pid=2512 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:32.867000 audit[2512]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2488 pid=2512 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:14:32.867000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839633433333161656332643933623662383938643665326534636130 Dec 13 14:14:32.868000 audit[2512]: AVC avc: denied { perfmon } for pid=2512 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:32.868000 audit[2512]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2488 pid=2512 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:14:32.868000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839633433333161656332643933623662383938643665326534636130 Dec 13 14:14:32.868000 audit[2512]: AVC avc: denied { bpf } for pid=2512 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:32.868000 audit[2512]: AVC avc: denied { bpf } for pid=2512 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:32.868000 audit[2512]: AVC avc: denied { bpf } for pid=2512 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:32.868000 audit[2512]: AVC avc: denied { perfmon } for pid=2512 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:32.868000 audit[2512]: AVC avc: denied { perfmon } for pid=2512 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:32.868000 audit[2512]: AVC avc: denied { perfmon } for pid=2512 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:32.868000 audit[2512]: AVC avc: denied { perfmon } for pid=2512 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:32.868000 audit[2512]: AVC avc: denied { perfmon } for pid=2512 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:32.868000 audit[2512]: AVC avc: denied { bpf } for pid=2512 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:32.868000 audit[2512]: AVC avc: denied { bpf } for pid=2512 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:32.868000 audit: BPF prog-id=65 op=LOAD Dec 13 14:14:32.868000 audit[2512]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2488 pid=2512 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:14:32.868000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839633433333161656332643933623662383938643665326534636130 Dec 13 14:14:32.868000 audit[2512]: AVC avc: denied { bpf } for pid=2512 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:32.868000 audit[2512]: AVC avc: denied { bpf } for pid=2512 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:32.868000 audit[2512]: AVC avc: denied { perfmon } for pid=2512 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:32.868000 audit[2512]: AVC avc: denied { perfmon } for pid=2512 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:32.868000 audit[2512]: AVC avc: denied { perfmon } for pid=2512 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:32.868000 audit[2512]: AVC avc: denied { perfmon } for pid=2512 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:32.868000 audit[2512]: AVC avc: denied { perfmon } for pid=2512 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:32.868000 audit[2512]: AVC avc: denied { bpf } for pid=2512 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:32.868000 audit[2512]: AVC avc: denied { bpf } for pid=2512 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:32.868000 audit: BPF prog-id=66 op=LOAD Dec 13 14:14:32.868000 audit[2512]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2488 pid=2512 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:14:32.868000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839633433333161656332643933623662383938643665326534636130 Dec 13 14:14:32.868000 audit: BPF prog-id=66 op=UNLOAD Dec 13 14:14:32.869000 audit: BPF prog-id=65 op=UNLOAD Dec 13 14:14:32.869000 audit[2512]: AVC avc: denied { bpf } for pid=2512 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:32.869000 audit[2512]: AVC avc: denied { bpf } for pid=2512 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:32.869000 audit[2512]: AVC avc: denied { bpf } for pid=2512 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:32.869000 audit[2512]: AVC avc: denied { perfmon } for pid=2512 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:32.869000 audit[2512]: AVC avc: denied { perfmon } for pid=2512 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:32.869000 audit[2512]: AVC avc: denied { perfmon } for pid=2512 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:32.869000 audit[2512]: AVC avc: denied { perfmon } for pid=2512 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:32.869000 audit[2512]: AVC avc: denied { perfmon } for pid=2512 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:32.869000 audit[2512]: AVC avc: denied { bpf } for pid=2512 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:32.869000 audit[2512]: AVC avc: denied { bpf } for pid=2512 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:32.869000 audit: BPF prog-id=67 op=LOAD Dec 13 14:14:32.869000 audit[2512]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2488 pid=2512 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:14:32.869000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839633433333161656332643933623662383938643665326534636130 Dec 13 14:14:32.898000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:32.898000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:32.898000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:32.898000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:32.898000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:32.898000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:32.898000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:32.898000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:32.898000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:32.898000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:32.898000 audit: BPF prog-id=68 op=LOAD Dec 13 14:14:32.900000 audit[2538]: AVC avc: denied { bpf } for pid=2538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:32.900000 audit[2538]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=2518 pid=2538 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:14:32.900000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163376666383164333639373235353730323239373232343864363032 Dec 13 14:14:32.900000 audit[2538]: AVC avc: denied { perfmon } for pid=2538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:32.900000 audit[2538]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=2518 pid=2538 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:14:32.900000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163376666383164333639373235353730323239373232343864363032 Dec 13 14:14:32.900000 audit[2538]: AVC avc: denied { bpf } for pid=2538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:32.900000 audit[2538]: AVC avc: denied { bpf } for pid=2538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:32.900000 audit[2538]: AVC avc: denied { bpf } for pid=2538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:32.900000 audit[2538]: AVC avc: denied { perfmon } for pid=2538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:32.900000 audit[2538]: AVC avc: denied { perfmon } for pid=2538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:32.900000 audit[2538]: AVC avc: denied { perfmon } for pid=2538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:32.900000 audit[2538]: AVC avc: denied { perfmon } for pid=2538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:32.900000 audit[2538]: AVC avc: denied { perfmon } for pid=2538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:32.900000 audit[2538]: AVC avc: denied { bpf } for pid=2538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:32.900000 audit[2538]: AVC avc: denied { bpf } for pid=2538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:32.900000 audit: BPF prog-id=69 op=LOAD Dec 13 14:14:32.900000 audit[2538]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=2518 pid=2538 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:14:32.900000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163376666383164333639373235353730323239373232343864363032 Dec 13 14:14:32.900000 audit[2538]: AVC avc: denied { bpf } for pid=2538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:32.900000 audit[2538]: AVC avc: denied { bpf } for pid=2538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:32.900000 audit[2538]: AVC avc: denied { perfmon } for pid=2538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:32.900000 audit[2538]: AVC avc: denied { perfmon } for pid=2538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:32.900000 audit[2538]: AVC avc: denied { perfmon } for pid=2538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:32.900000 audit[2538]: AVC avc: denied { perfmon } for pid=2538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:32.900000 audit[2538]: AVC avc: denied { perfmon } for pid=2538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:32.900000 audit[2538]: AVC avc: denied { bpf } for pid=2538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:32.900000 audit[2538]: AVC avc: denied { bpf } for pid=2538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:32.900000 audit: BPF prog-id=70 op=LOAD Dec 13 14:14:32.900000 audit[2538]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=2518 pid=2538 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:14:32.900000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163376666383164333639373235353730323239373232343864363032 Dec 13 14:14:32.900000 audit: BPF prog-id=70 op=UNLOAD Dec 13 14:14:32.900000 audit: BPF prog-id=69 op=UNLOAD Dec 13 14:14:32.901000 audit[2538]: AVC avc: denied { bpf } for pid=2538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:32.901000 audit[2538]: AVC avc: denied { bpf } for pid=2538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:32.901000 audit[2538]: AVC avc: denied { bpf } for pid=2538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:32.901000 audit[2538]: AVC avc: denied { perfmon } for pid=2538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:32.901000 audit[2538]: AVC avc: denied { perfmon } for pid=2538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:32.901000 audit[2538]: AVC avc: denied { perfmon } for pid=2538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:32.901000 audit[2538]: AVC avc: denied { perfmon } for pid=2538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:32.901000 audit[2538]: AVC avc: denied { perfmon } for pid=2538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:32.901000 audit[2538]: AVC avc: denied { bpf } for pid=2538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:32.901000 audit[2538]: AVC avc: denied { bpf } for pid=2538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:32.901000 audit: BPF prog-id=71 op=LOAD Dec 13 14:14:32.901000 audit[2538]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=2518 pid=2538 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:14:32.901000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163376666383164333639373235353730323239373232343864363032 Dec 13 14:14:32.944184 env[1818]: time="2024-12-13T14:14:32.944107070Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ip-172-31-18-231,Uid:ca3b994e64a190bf87289de9f3f7d15d,Namespace:kube-system,Attempt:0,} returns sandbox id \"89c4331aec2d93b6b898d6e2e4ca0d445d41a8f6125b6365274fe3f99a72a95e\"" Dec 13 14:14:32.955196 env[1818]: time="2024-12-13T14:14:32.955138393Z" level=info msg="CreateContainer within sandbox \"89c4331aec2d93b6b898d6e2e4ca0d445d41a8f6125b6365274fe3f99a72a95e\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Dec 13 14:14:32.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:32.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:32.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:32.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:32.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:32.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:32.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:32.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:32.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:32.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:32.965000 audit: BPF prog-id=72 op=LOAD Dec 13 14:14:32.967000 audit[2540]: AVC avc: denied { bpf } for pid=2540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:32.967000 audit[2540]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2511 pid=2540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:14:32.967000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632383634336564333231623539623862663833653031376333386435 Dec 13 14:14:32.967000 audit[2540]: AVC avc: denied { perfmon } for pid=2540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:32.967000 audit[2540]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2511 pid=2540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:14:32.967000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632383634336564333231623539623862663833653031376333386435 Dec 13 14:14:32.967000 audit[2540]: AVC avc: denied { bpf } for pid=2540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:32.967000 audit[2540]: AVC avc: denied { bpf } for pid=2540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:32.967000 audit[2540]: AVC avc: denied { bpf } for pid=2540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:32.967000 audit[2540]: AVC avc: denied { perfmon } for pid=2540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:32.967000 audit[2540]: AVC avc: denied { perfmon } for pid=2540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:32.967000 audit[2540]: AVC avc: denied { perfmon } for pid=2540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:32.967000 audit[2540]: AVC avc: denied { perfmon } for pid=2540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:32.967000 audit[2540]: AVC avc: denied { perfmon } for pid=2540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:32.967000 audit[2540]: AVC avc: denied { bpf } for pid=2540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:32.967000 audit[2540]: AVC avc: denied { bpf } for pid=2540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:32.967000 audit: BPF prog-id=73 op=LOAD Dec 13 14:14:32.967000 audit[2540]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2511 pid=2540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:14:32.967000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632383634336564333231623539623862663833653031376333386435 Dec 13 14:14:32.967000 audit[2540]: AVC avc: denied { bpf } for pid=2540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:32.967000 audit[2540]: AVC avc: denied { bpf } for pid=2540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:32.967000 audit[2540]: AVC avc: denied { perfmon } for pid=2540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:32.967000 audit[2540]: AVC avc: denied { perfmon } for pid=2540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:32.967000 audit[2540]: AVC avc: denied { perfmon } for pid=2540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:32.967000 audit[2540]: AVC avc: denied { perfmon } for pid=2540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:32.967000 audit[2540]: AVC avc: denied { perfmon } for pid=2540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:32.967000 audit[2540]: AVC avc: denied { bpf } for pid=2540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:32.967000 audit[2540]: AVC avc: denied { bpf } for pid=2540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:32.967000 audit: BPF prog-id=74 op=LOAD Dec 13 14:14:32.967000 audit[2540]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2511 pid=2540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:14:32.967000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632383634336564333231623539623862663833653031376333386435 Dec 13 14:14:32.968000 audit: BPF prog-id=74 op=UNLOAD Dec 13 14:14:32.968000 audit: BPF prog-id=73 op=UNLOAD Dec 13 14:14:32.968000 audit[2540]: AVC avc: denied { bpf } for pid=2540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:32.968000 audit[2540]: AVC avc: denied { bpf } for pid=2540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:32.968000 audit[2540]: AVC avc: denied { bpf } for pid=2540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:32.968000 audit[2540]: AVC avc: denied { perfmon } for pid=2540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:32.968000 audit[2540]: AVC avc: denied { perfmon } for pid=2540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:32.968000 audit[2540]: AVC avc: denied { perfmon } for pid=2540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:32.968000 audit[2540]: AVC avc: denied { perfmon } for pid=2540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:32.968000 audit[2540]: AVC avc: denied { perfmon } for pid=2540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:32.968000 audit[2540]: AVC avc: denied { bpf } for pid=2540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:32.968000 audit[2540]: AVC avc: denied { bpf } for pid=2540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:32.968000 audit: BPF prog-id=75 op=LOAD Dec 13 14:14:32.968000 audit[2540]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2511 pid=2540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:14:32.968000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632383634336564333231623539623862663833653031376333386435 Dec 13 14:14:32.982666 env[1818]: time="2024-12-13T14:14:32.981982553Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ip-172-31-18-231,Uid:3e8d3657146926bece42f1354f3006d4,Namespace:kube-system,Attempt:0,} returns sandbox id \"1c7ff81d36972557022972248d6026d3078b1dc2ebbf8b371f6dff12a3f16cf2\"" Dec 13 14:14:32.987697 env[1818]: time="2024-12-13T14:14:32.987621333Z" level=info msg="CreateContainer within sandbox \"1c7ff81d36972557022972248d6026d3078b1dc2ebbf8b371f6dff12a3f16cf2\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Dec 13 14:14:33.009660 env[1818]: time="2024-12-13T14:14:33.009592590Z" level=info msg="CreateContainer within sandbox \"89c4331aec2d93b6b898d6e2e4ca0d445d41a8f6125b6365274fe3f99a72a95e\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"472f752c1bdfcd34e55424f6ac0ea28e9128102e7f395d525947cf46b9dc16b8\"" Dec 13 14:14:33.014639 env[1818]: time="2024-12-13T14:14:33.014564074Z" level=info msg="StartContainer for \"472f752c1bdfcd34e55424f6ac0ea28e9128102e7f395d525947cf46b9dc16b8\"" Dec 13 14:14:33.025519 kubelet[2449]: E1213 14:14:33.025462 2449 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.31.18.231:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-18-231?timeout=10s\": dial tcp 172.31.18.231:6443: connect: connection refused" interval="1.6s" Dec 13 14:14:33.032302 env[1818]: time="2024-12-13T14:14:33.032216547Z" level=info msg="CreateContainer within sandbox \"1c7ff81d36972557022972248d6026d3078b1dc2ebbf8b371f6dff12a3f16cf2\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"ad2ad78420188ee8fa948e31c84f01a15333494e9a3b1df56668606e71b847fd\"" Dec 13 14:14:33.033916 env[1818]: time="2024-12-13T14:14:33.033859408Z" level=info msg="StartContainer for \"ad2ad78420188ee8fa948e31c84f01a15333494e9a3b1df56668606e71b847fd\"" Dec 13 14:14:33.044903 env[1818]: time="2024-12-13T14:14:33.044824897Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ip-172-31-18-231,Uid:06a9d235d0d5a909753e4080c0ed3d93,Namespace:kube-system,Attempt:0,} returns sandbox id \"628643ed321b59b8bf83e017c38d55997cd9b43fd25e53fa4cf988f61858a040\"" Dec 13 14:14:33.050388 env[1818]: time="2024-12-13T14:14:33.050327113Z" level=info msg="CreateContainer within sandbox \"628643ed321b59b8bf83e017c38d55997cd9b43fd25e53fa4cf988f61858a040\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Dec 13 14:14:33.056784 kubelet[2449]: W1213 14:14:33.056676 2449 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Service: Get "https://172.31.18.231:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.31.18.231:6443: connect: connection refused Dec 13 14:14:33.056936 kubelet[2449]: E1213 14:14:33.056806 2449 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://172.31.18.231:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.31.18.231:6443: connect: connection refused Dec 13 14:14:33.078083 systemd[1]: Started cri-containerd-472f752c1bdfcd34e55424f6ac0ea28e9128102e7f395d525947cf46b9dc16b8.scope. Dec 13 14:14:33.093864 env[1818]: time="2024-12-13T14:14:33.093770904Z" level=info msg="CreateContainer within sandbox \"628643ed321b59b8bf83e017c38d55997cd9b43fd25e53fa4cf988f61858a040\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"37495195846267a742cf787172d0972af29eb23419884ff748a6b75465ae1031\"" Dec 13 14:14:33.094830 env[1818]: time="2024-12-13T14:14:33.094782158Z" level=info msg="StartContainer for \"37495195846267a742cf787172d0972af29eb23419884ff748a6b75465ae1031\"" Dec 13 14:14:33.115037 systemd[1]: Started cri-containerd-ad2ad78420188ee8fa948e31c84f01a15333494e9a3b1df56668606e71b847fd.scope. Dec 13 14:14:33.132000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:33.132000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:33.132000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:33.132000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:33.134000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:33.134000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:33.134000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:33.134000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:33.134000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:33.135000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:33.135000 audit: BPF prog-id=76 op=LOAD Dec 13 14:14:33.138376 kubelet[2449]: I1213 14:14:33.137827 2449 kubelet_node_status.go:73] "Attempting to register node" node="ip-172-31-18-231" Dec 13 14:14:33.138376 kubelet[2449]: E1213 14:14:33.138303 2449 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://172.31.18.231:6443/api/v1/nodes\": dial tcp 172.31.18.231:6443: connect: connection refused" node="ip-172-31-18-231" Dec 13 14:14:33.138000 audit[2612]: AVC avc: denied { bpf } for pid=2612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:33.138000 audit[2612]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=2488 pid=2612 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:14:33.138000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437326637353263316264666364333465353534323466366163306561 Dec 13 14:14:33.138000 audit[2612]: AVC avc: denied { perfmon } for pid=2612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:33.138000 audit[2612]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=2488 pid=2612 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:14:33.138000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437326637353263316264666364333465353534323466366163306561 Dec 13 14:14:33.140000 audit[2612]: AVC avc: denied { bpf } for pid=2612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:33.140000 audit[2612]: AVC avc: denied { bpf } for pid=2612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:33.140000 audit[2612]: AVC avc: denied { bpf } for pid=2612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:33.140000 audit[2612]: AVC avc: denied { perfmon } for pid=2612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:33.140000 audit[2612]: AVC avc: denied { perfmon } for pid=2612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:33.140000 audit[2612]: AVC avc: denied { perfmon } for pid=2612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:33.140000 audit[2612]: AVC avc: denied { perfmon } for pid=2612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:33.140000 audit[2612]: AVC avc: denied { perfmon } for pid=2612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:33.140000 audit[2612]: AVC avc: denied { bpf } for pid=2612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:33.140000 audit[2612]: AVC avc: denied { bpf } for pid=2612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:33.140000 audit: BPF prog-id=77 op=LOAD Dec 13 14:14:33.140000 audit[2612]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=2488 pid=2612 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:14:33.140000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437326637353263316264666364333465353534323466366163306561 Dec 13 14:14:33.140000 audit[2612]: AVC avc: denied { bpf } for pid=2612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:33.140000 audit[2612]: AVC avc: denied { bpf } for pid=2612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:33.140000 audit[2612]: AVC avc: denied { perfmon } for pid=2612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:33.140000 audit[2612]: AVC avc: denied { perfmon } for pid=2612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:33.140000 audit[2612]: AVC avc: denied { perfmon } for pid=2612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:33.140000 audit[2612]: AVC avc: denied { perfmon } for pid=2612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:33.140000 audit[2612]: AVC avc: denied { perfmon } for pid=2612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:33.140000 audit[2612]: AVC avc: denied { bpf } for pid=2612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:33.140000 audit[2612]: AVC avc: denied { bpf } for pid=2612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:33.140000 audit: BPF prog-id=78 op=LOAD Dec 13 14:14:33.140000 audit[2612]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=2488 pid=2612 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:14:33.140000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437326637353263316264666364333465353534323466366163306561 Dec 13 14:14:33.140000 audit: BPF prog-id=78 op=UNLOAD Dec 13 14:14:33.140000 audit: BPF prog-id=77 op=UNLOAD Dec 13 14:14:33.140000 audit[2612]: AVC avc: denied { bpf } for pid=2612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:33.140000 audit[2612]: AVC avc: denied { bpf } for pid=2612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:33.140000 audit[2612]: AVC avc: denied { bpf } for pid=2612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:33.140000 audit[2612]: AVC avc: denied { perfmon } for pid=2612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:33.140000 audit[2612]: AVC avc: denied { perfmon } for pid=2612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:33.140000 audit[2612]: AVC avc: denied { perfmon } for pid=2612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:33.140000 audit[2612]: AVC avc: denied { perfmon } for pid=2612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:33.140000 audit[2612]: AVC avc: denied { perfmon } for pid=2612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:33.140000 audit[2612]: AVC avc: denied { bpf } for pid=2612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:33.140000 audit[2612]: AVC avc: denied { bpf } for pid=2612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:33.140000 audit: BPF prog-id=79 op=LOAD Dec 13 14:14:33.140000 audit[2612]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=2488 pid=2612 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:14:33.140000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437326637353263316264666364333465353534323466366163306561 Dec 13 14:14:33.158157 systemd[1]: Started cri-containerd-37495195846267a742cf787172d0972af29eb23419884ff748a6b75465ae1031.scope. Dec 13 14:14:33.213000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:33.213000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:33.213000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:33.213000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:33.213000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:33.213000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:33.213000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:33.213000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:33.213000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:33.213000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:33.213000 audit: BPF prog-id=80 op=LOAD Dec 13 14:14:33.215000 audit[2654]: AVC avc: denied { bpf } for pid=2654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:33.215000 audit[2654]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400011db38 a2=10 a3=0 items=0 ppid=2511 pid=2654 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:14:33.215000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337343935313935383436323637613734326366373837313732643039 Dec 13 14:14:33.215000 audit[2654]: AVC avc: denied { perfmon } for pid=2654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:33.215000 audit[2654]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400011d5a0 a2=3c a3=0 items=0 ppid=2511 pid=2654 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:14:33.215000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337343935313935383436323637613734326366373837313732643039 Dec 13 14:14:33.215000 audit[2654]: AVC avc: denied { bpf } for pid=2654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:33.215000 audit[2654]: AVC avc: denied { bpf } for pid=2654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:33.215000 audit[2654]: AVC avc: denied { bpf } for pid=2654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:33.215000 audit[2654]: AVC avc: denied { perfmon } for pid=2654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:33.215000 audit[2654]: AVC avc: denied { perfmon } for pid=2654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:33.215000 audit[2654]: AVC avc: denied { perfmon } for pid=2654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:33.215000 audit[2654]: AVC avc: denied { perfmon } for pid=2654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:33.215000 audit[2654]: AVC avc: denied { perfmon } for pid=2654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:33.215000 audit[2654]: AVC avc: denied { bpf } for pid=2654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:33.215000 audit[2654]: AVC avc: denied { bpf } for pid=2654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:33.215000 audit: BPF prog-id=81 op=LOAD Dec 13 14:14:33.215000 audit[2654]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011d8e0 a2=78 a3=0 items=0 ppid=2511 pid=2654 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:14:33.215000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337343935313935383436323637613734326366373837313732643039 Dec 13 14:14:33.216000 audit[2654]: AVC avc: denied { bpf } for pid=2654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:33.216000 audit[2654]: AVC avc: denied { bpf } for pid=2654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:33.216000 audit[2654]: AVC avc: denied { perfmon } for pid=2654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:33.216000 audit[2654]: AVC avc: denied { perfmon } for pid=2654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:33.216000 audit[2654]: AVC avc: denied { perfmon } for pid=2654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:33.216000 audit[2654]: AVC avc: denied { perfmon } for pid=2654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:33.216000 audit[2654]: AVC avc: denied { perfmon } for pid=2654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:33.216000 audit[2654]: AVC avc: denied { bpf } for pid=2654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:33.216000 audit[2654]: AVC avc: denied { bpf } for pid=2654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:33.216000 audit: BPF prog-id=82 op=LOAD Dec 13 14:14:33.216000 audit[2654]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400011d670 a2=78 a3=0 items=0 ppid=2511 pid=2654 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:14:33.216000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337343935313935383436323637613734326366373837313732643039 Dec 13 14:14:33.216000 audit: BPF prog-id=82 op=UNLOAD Dec 13 14:14:33.216000 audit: BPF prog-id=81 op=UNLOAD Dec 13 14:14:33.216000 audit[2654]: AVC avc: denied { bpf } for pid=2654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:33.216000 audit[2654]: AVC avc: denied { bpf } for pid=2654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:33.216000 audit[2654]: AVC avc: denied { bpf } for pid=2654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:33.216000 audit[2654]: AVC avc: denied { perfmon } for pid=2654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:33.216000 audit[2654]: AVC avc: denied { perfmon } for pid=2654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:33.216000 audit[2654]: AVC avc: denied { perfmon } for pid=2654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:33.216000 audit[2654]: AVC avc: denied { perfmon } for pid=2654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:33.216000 audit[2654]: AVC avc: denied { perfmon } for pid=2654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:33.216000 audit[2654]: AVC avc: denied { bpf } for pid=2654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:33.216000 audit[2654]: AVC avc: denied { bpf } for pid=2654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:33.216000 audit: BPF prog-id=83 op=LOAD Dec 13 14:14:33.216000 audit[2654]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011db40 a2=78 a3=0 items=0 ppid=2511 pid=2654 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:14:33.216000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337343935313935383436323637613734326366373837313732643039 Dec 13 14:14:33.228000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:33.228000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:33.228000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:33.228000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:33.228000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:33.228000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:33.228000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:33.228000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:33.228000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:33.228000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:33.228000 audit: BPF prog-id=84 op=LOAD Dec 13 14:14:33.231000 audit[2631]: AVC avc: denied { bpf } for pid=2631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:33.231000 audit[2631]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2518 pid=2631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:14:33.231000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164326164373834323031383865653866613934386533316338346630 Dec 13 14:14:33.233000 audit[2631]: AVC avc: denied { perfmon } for pid=2631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:33.233000 audit[2631]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2518 pid=2631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:14:33.233000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164326164373834323031383865653866613934386533316338346630 Dec 13 14:14:33.233000 audit[2631]: AVC avc: denied { bpf } for pid=2631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:33.233000 audit[2631]: AVC avc: denied { bpf } for pid=2631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:33.233000 audit[2631]: AVC avc: denied { bpf } for pid=2631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:33.233000 audit[2631]: AVC avc: denied { perfmon } for pid=2631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:33.233000 audit[2631]: AVC avc: denied { perfmon } for pid=2631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:33.233000 audit[2631]: AVC avc: denied { perfmon } for pid=2631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:33.233000 audit[2631]: AVC avc: denied { perfmon } for pid=2631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:33.233000 audit[2631]: AVC avc: denied { perfmon } for pid=2631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:33.233000 audit[2631]: AVC avc: denied { bpf } for pid=2631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:33.233000 audit[2631]: AVC avc: denied { bpf } for pid=2631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:33.233000 audit: BPF prog-id=85 op=LOAD Dec 13 14:14:33.233000 audit[2631]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2518 pid=2631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:14:33.233000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164326164373834323031383865653866613934386533316338346630 Dec 13 14:14:33.234000 audit[2631]: AVC avc: denied { bpf } for pid=2631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:33.234000 audit[2631]: AVC avc: denied { bpf } for pid=2631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:33.234000 audit[2631]: AVC avc: denied { perfmon } for pid=2631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:33.234000 audit[2631]: AVC avc: denied { perfmon } for pid=2631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:33.234000 audit[2631]: AVC avc: denied { perfmon } for pid=2631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:33.234000 audit[2631]: AVC avc: denied { perfmon } for pid=2631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:33.234000 audit[2631]: AVC avc: denied { perfmon } for pid=2631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:33.234000 audit[2631]: AVC avc: denied { bpf } for pid=2631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:33.234000 audit[2631]: AVC avc: denied { bpf } for pid=2631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:33.234000 audit: BPF prog-id=86 op=LOAD Dec 13 14:14:33.234000 audit[2631]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2518 pid=2631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:14:33.234000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164326164373834323031383865653866613934386533316338346630 Dec 13 14:14:33.236000 audit: BPF prog-id=86 op=UNLOAD Dec 13 14:14:33.237000 audit: BPF prog-id=85 op=UNLOAD Dec 13 14:14:33.237000 audit[2631]: AVC avc: denied { bpf } for pid=2631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:33.237000 audit[2631]: AVC avc: denied { bpf } for pid=2631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:33.237000 audit[2631]: AVC avc: denied { bpf } for pid=2631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:33.237000 audit[2631]: AVC avc: denied { perfmon } for pid=2631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:33.237000 audit[2631]: AVC avc: denied { perfmon } for pid=2631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:33.237000 audit[2631]: AVC avc: denied { perfmon } for pid=2631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:33.237000 audit[2631]: AVC avc: denied { perfmon } for pid=2631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:33.237000 audit[2631]: AVC avc: denied { perfmon } for pid=2631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:33.237000 audit[2631]: AVC avc: denied { bpf } for pid=2631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:33.237000 audit[2631]: AVC avc: denied { bpf } for pid=2631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:33.237000 audit: BPF prog-id=87 op=LOAD Dec 13 14:14:33.237000 audit[2631]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2518 pid=2631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:14:33.237000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164326164373834323031383865653866613934386533316338346630 Dec 13 14:14:33.258550 env[1818]: time="2024-12-13T14:14:33.258486179Z" level=info msg="StartContainer for \"472f752c1bdfcd34e55424f6ac0ea28e9128102e7f395d525947cf46b9dc16b8\" returns successfully" Dec 13 14:14:33.263524 kubelet[2449]: W1213 14:14:33.263344 2449 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.RuntimeClass: Get "https://172.31.18.231:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.18.231:6443: connect: connection refused Dec 13 14:14:33.263524 kubelet[2449]: E1213 14:14:33.263463 2449 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://172.31.18.231:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.31.18.231:6443: connect: connection refused Dec 13 14:14:33.279271 env[1818]: time="2024-12-13T14:14:33.278603963Z" level=info msg="StartContainer for \"37495195846267a742cf787172d0972af29eb23419884ff748a6b75465ae1031\" returns successfully" Dec 13 14:14:33.316294 env[1818]: time="2024-12-13T14:14:33.316188310Z" level=info msg="StartContainer for \"ad2ad78420188ee8fa948e31c84f01a15333494e9a3b1df56668606e71b847fd\" returns successfully" Dec 13 14:14:34.740598 kubelet[2449]: I1213 14:14:34.740566 2449 kubelet_node_status.go:73] "Attempting to register node" node="ip-172-31-18-231" Dec 13 14:14:36.492000 audit[2664]: AVC avc: denied { watch } for pid=2664 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=8277 scontext=system_u:system_r:svirt_lxc_net_t:s0:c127,c295 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:14:36.494727 kernel: kauditd_printk_skb: 559 callbacks suppressed Dec 13 14:14:36.494855 kernel: audit: type=1400 audit(1734099276.492:566): avc: denied { watch } for pid=2664 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=8277 scontext=system_u:system_r:svirt_lxc_net_t:s0:c127,c295 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:14:36.492000 audit[2664]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=4000077710 a2=fc6 a3=0 items=0 ppid=2518 pid=2664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c127,c295 key=(null) Dec 13 14:14:36.492000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:14:36.532596 kernel: audit: type=1300 audit(1734099276.492:566): arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=4000077710 a2=fc6 a3=0 items=0 ppid=2518 pid=2664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c127,c295 key=(null) Dec 13 14:14:36.532714 kernel: audit: type=1327 audit(1734099276.492:566): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:14:36.492000 audit[2664]: AVC avc: denied { watch } for pid=2664 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=8270 scontext=system_u:system_r:svirt_lxc_net_t:s0:c127,c295 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:14:36.545060 kernel: audit: type=1400 audit(1734099276.492:567): avc: denied { watch } for pid=2664 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=8270 scontext=system_u:system_r:svirt_lxc_net_t:s0:c127,c295 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:14:36.492000 audit[2664]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=4000ba2040 a2=fc6 a3=0 items=0 ppid=2518 pid=2664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c127,c295 key=(null) Dec 13 14:14:36.560764 kernel: audit: type=1300 audit(1734099276.492:567): arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=4000ba2040 a2=fc6 a3=0 items=0 ppid=2518 pid=2664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c127,c295 key=(null) Dec 13 14:14:36.492000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:14:36.571812 kernel: audit: type=1327 audit(1734099276.492:567): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:14:37.666000 audit[2638]: AVC avc: denied { watch } for pid=2638 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=8277 scontext=system_u:system_r:svirt_lxc_net_t:s0:c190,c319 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:14:37.666000 audit[2638]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=41 a1=4008402c00 a2=fc6 a3=0 items=0 ppid=2488 pid=2638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c190,c319 key=(null) Dec 13 14:14:37.688263 kernel: audit: type=1400 audit(1734099277.666:568): avc: denied { watch } for pid=2638 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=8277 scontext=system_u:system_r:svirt_lxc_net_t:s0:c190,c319 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:14:37.688487 kernel: audit: type=1300 audit(1734099277.666:568): arch=c00000b7 syscall=27 success=no exit=-13 a0=41 a1=4008402c00 a2=fc6 a3=0 items=0 ppid=2488 pid=2638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c190,c319 key=(null) Dec 13 14:14:37.666000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31382E323331002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:14:37.702946 kernel: audit: type=1327 audit(1734099277.666:568): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31382E323331002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:14:37.666000 audit[2638]: AVC avc: denied { watch } for pid=2638 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=8270 scontext=system_u:system_r:svirt_lxc_net_t:s0:c190,c319 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:14:37.714533 kernel: audit: type=1400 audit(1734099277.666:569): avc: denied { watch } for pid=2638 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=8270 scontext=system_u:system_r:svirt_lxc_net_t:s0:c190,c319 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:14:37.666000 audit[2638]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=41 a1=400316db40 a2=fc6 a3=0 items=0 ppid=2488 pid=2638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c190,c319 key=(null) Dec 13 14:14:37.666000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31382E323331002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:14:37.667000 audit[2638]: AVC avc: denied { watch } for pid=2638 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=8272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c190,c319 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:14:37.667000 audit[2638]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=40 a1=4008402d20 a2=fc6 a3=0 items=0 ppid=2488 pid=2638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c190,c319 key=(null) Dec 13 14:14:37.667000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31382E323331002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:14:37.676000 audit[2638]: AVC avc: denied { watch } for pid=2638 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=8279 scontext=system_u:system_r:svirt_lxc_net_t:s0:c190,c319 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:14:37.676000 audit[2638]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=4a a1=40089d7740 a2=fc6 a3=0 items=0 ppid=2488 pid=2638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c190,c319 key=(null) Dec 13 14:14:37.676000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31382E323331002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:14:37.689000 audit[2638]: AVC avc: denied { watch } for pid=2638 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=8270 scontext=system_u:system_r:svirt_lxc_net_t:s0:c190,c319 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:14:37.689000 audit[2638]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=4e a1=4005fd78e0 a2=fc6 a3=0 items=0 ppid=2488 pid=2638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c190,c319 key=(null) Dec 13 14:14:37.689000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31382E323331002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:14:37.690000 audit[2638]: AVC avc: denied { watch } for pid=2638 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=8277 scontext=system_u:system_r:svirt_lxc_net_t:s0:c190,c319 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:14:37.690000 audit[2638]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=4e a1=40089d7d40 a2=fc6 a3=0 items=0 ppid=2488 pid=2638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c190,c319 key=(null) Dec 13 14:14:37.690000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31382E323331002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:14:38.010844 kubelet[2449]: E1213 14:14:38.010703 2449 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"ip-172-31-18-231\" not found" node="ip-172-31-18-231" Dec 13 14:14:38.030773 kubelet[2449]: I1213 14:14:38.030722 2449 kubelet_node_status.go:76] "Successfully registered node" node="ip-172-31-18-231" Dec 13 14:14:38.474559 update_engine[1812]: I1213 14:14:38.474499 1812 update_attempter.cc:509] Updating boot flags... Dec 13 14:14:38.592035 kubelet[2449]: I1213 14:14:38.591686 2449 apiserver.go:52] "Watching apiserver" Dec 13 14:14:38.621412 kubelet[2449]: I1213 14:14:38.621329 2449 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Dec 13 14:14:41.063010 systemd[1]: Reloading. Dec 13 14:14:41.232598 /usr/lib/systemd/system-generators/torcx-generator[3010]: time="2024-12-13T14:14:41Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:14:41.233205 /usr/lib/systemd/system-generators/torcx-generator[3010]: time="2024-12-13T14:14:41Z" level=info msg="torcx already run" Dec 13 14:14:41.424220 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:14:41.424520 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:14:41.472752 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:14:41.679000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.682387 kernel: kauditd_printk_skb: 14 callbacks suppressed Dec 13 14:14:41.682565 kernel: audit: type=1400 audit(1734099281.679:574): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.688000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.707356 kernel: audit: type=1400 audit(1734099281.688:575): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.707524 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Dec 13 14:14:41.707569 kernel: audit: audit_lost=2 audit_rate_limit=0 audit_backlog_limit=64 Dec 13 14:14:41.707609 kernel: audit: backlog limit exceeded Dec 13 14:14:41.688000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.715550 kernel: audit: type=1400 audit(1734099281.688:576): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.715698 kernel: audit: type=1400 audit(1734099281.688:577): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.688000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.731084 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Dec 13 14:14:41.731198 kernel: audit: audit_lost=3 audit_rate_limit=0 audit_backlog_limit=64 Dec 13 14:14:41.741310 kernel: audit: type=1400 audit(1734099281.688:578): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.688000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.688000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.688000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.688000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.688000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.688000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.688000 audit: BPF prog-id=88 op=LOAD Dec 13 14:14:41.688000 audit: BPF prog-id=49 op=UNLOAD Dec 13 14:14:41.689000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.689000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.690000 audit: BPF prog-id=89 op=LOAD Dec 13 14:14:41.690000 audit: BPF prog-id=50 op=UNLOAD Dec 13 14:14:41.692000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.692000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.692000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.692000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.692000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.692000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.692000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.692000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.692000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.692000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.692000 audit: BPF prog-id=90 op=LOAD Dec 13 14:14:41.692000 audit: BPF prog-id=51 op=UNLOAD Dec 13 14:14:41.692000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.692000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.692000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.692000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.692000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.692000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.692000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.692000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.692000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.692000 audit: BPF prog-id=91 op=LOAD Dec 13 14:14:41.693000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.693000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.693000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.693000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.693000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.693000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.693000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.693000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.693000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.693000 audit: BPF prog-id=92 op=LOAD Dec 13 14:14:41.693000 audit: BPF prog-id=52 op=UNLOAD Dec 13 14:14:41.693000 audit: BPF prog-id=53 op=UNLOAD Dec 13 14:14:41.702000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.702000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.702000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.702000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.702000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.702000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.702000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.702000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.702000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.722000 audit: BPF prog-id=93 op=LOAD Dec 13 14:14:41.722000 audit: BPF prog-id=54 op=UNLOAD Dec 13 14:14:41.734000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.743000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.743000 audit: BPF prog-id=94 op=LOAD Dec 13 14:14:41.743000 audit: BPF prog-id=55 op=UNLOAD Dec 13 14:14:41.743000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.743000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.743000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.743000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.743000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.743000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.743000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.743000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.743000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.743000 audit: BPF prog-id=95 op=LOAD Dec 13 14:14:41.743000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.743000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.743000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.743000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.743000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.743000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.743000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.743000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.743000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.743000 audit: BPF prog-id=96 op=LOAD Dec 13 14:14:41.743000 audit: BPF prog-id=56 op=UNLOAD Dec 13 14:14:41.743000 audit: BPF prog-id=57 op=UNLOAD Dec 13 14:14:41.748000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.748000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.748000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.748000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.748000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.748000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.748000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.748000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.748000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.748000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.748000 audit: BPF prog-id=97 op=LOAD Dec 13 14:14:41.748000 audit: BPF prog-id=76 op=UNLOAD Dec 13 14:14:41.751000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.751000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.751000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.751000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.751000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.751000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.751000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.751000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.751000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.751000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.751000 audit: BPF prog-id=98 op=LOAD Dec 13 14:14:41.751000 audit: BPF prog-id=58 op=UNLOAD Dec 13 14:14:41.755000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.755000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.755000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.755000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.755000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.755000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.755000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.755000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.755000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.755000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.755000 audit: BPF prog-id=99 op=LOAD Dec 13 14:14:41.755000 audit: BPF prog-id=68 op=UNLOAD Dec 13 14:14:41.756000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.756000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.756000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.756000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.756000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.756000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.756000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.756000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.756000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.756000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.756000 audit: BPF prog-id=100 op=LOAD Dec 13 14:14:41.756000 audit: BPF prog-id=72 op=UNLOAD Dec 13 14:14:41.757000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.757000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.757000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.757000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.757000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.757000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.757000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.757000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.757000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.757000 audit: BPF prog-id=101 op=LOAD Dec 13 14:14:41.757000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.757000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.757000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.757000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.757000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.757000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.757000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.757000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.757000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.757000 audit: BPF prog-id=102 op=LOAD Dec 13 14:14:41.757000 audit: BPF prog-id=59 op=UNLOAD Dec 13 14:14:41.757000 audit: BPF prog-id=60 op=UNLOAD Dec 13 14:14:41.761000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.761000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.761000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.761000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.761000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.761000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.761000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.761000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.761000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.761000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.761000 audit: BPF prog-id=103 op=LOAD Dec 13 14:14:41.761000 audit: BPF prog-id=80 op=UNLOAD Dec 13 14:14:41.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.768000 audit: BPF prog-id=104 op=LOAD Dec 13 14:14:41.768000 audit: BPF prog-id=84 op=UNLOAD Dec 13 14:14:41.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.769000 audit: BPF prog-id=105 op=LOAD Dec 13 14:14:41.769000 audit: BPF prog-id=61 op=UNLOAD Dec 13 14:14:41.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.769000 audit: BPF prog-id=106 op=LOAD Dec 13 14:14:41.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.769000 audit: BPF prog-id=107 op=LOAD Dec 13 14:14:41.769000 audit: BPF prog-id=62 op=UNLOAD Dec 13 14:14:41.769000 audit: BPF prog-id=63 op=UNLOAD Dec 13 14:14:41.770000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.773000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.773000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.773000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.773000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.773000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.773000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.773000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.773000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.773000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:41.773000 audit: BPF prog-id=108 op=LOAD Dec 13 14:14:41.773000 audit: BPF prog-id=64 op=UNLOAD Dec 13 14:14:41.826941 systemd[1]: Stopping kubelet.service... Dec 13 14:14:41.827614 kubelet[2449]: I1213 14:14:41.827438 2449 dynamic_cafile_content.go:171] "Shutting down controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 14:14:41.851469 systemd[1]: kubelet.service: Deactivated successfully. Dec 13 14:14:41.851859 systemd[1]: Stopped kubelet.service. Dec 13 14:14:41.851000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:14:41.851957 systemd[1]: kubelet.service: Consumed 2.528s CPU time. Dec 13 14:14:41.857778 systemd[1]: Starting kubelet.service... Dec 13 14:14:42.071000 audit[2664]: AVC avc: denied { watch } for pid=2664 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="nvme0n1p9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c127,c295 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Dec 13 14:14:42.071000 audit[2664]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=40009fb9c0 a2=fc6 a3=0 items=0 ppid=2518 pid=2664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c127,c295 key=(null) Dec 13 14:14:42.071000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:14:42.142000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:14:42.140567 systemd[1]: Started kubelet.service. Dec 13 14:14:42.261566 kubelet[3066]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 14:14:42.262145 kubelet[3066]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Dec 13 14:14:42.262256 kubelet[3066]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 14:14:42.262629 kubelet[3066]: I1213 14:14:42.262556 3066 server.go:204] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Dec 13 14:14:42.272587 kubelet[3066]: I1213 14:14:42.272017 3066 server.go:487] "Kubelet version" kubeletVersion="v1.29.2" Dec 13 14:14:42.272587 kubelet[3066]: I1213 14:14:42.272071 3066 server.go:489] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Dec 13 14:14:42.272781 kubelet[3066]: I1213 14:14:42.272675 3066 server.go:919] "Client rotation is on, will bootstrap in background" Dec 13 14:14:42.279187 kubelet[3066]: I1213 14:14:42.279128 3066 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Dec 13 14:14:42.286242 kubelet[3066]: I1213 14:14:42.286197 3066 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 14:14:42.306012 kubelet[3066]: I1213 14:14:42.305918 3066 server.go:745] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Dec 13 14:14:42.307177 kubelet[3066]: I1213 14:14:42.306522 3066 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Dec 13 14:14:42.307177 kubelet[3066]: I1213 14:14:42.306828 3066 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Dec 13 14:14:42.307177 kubelet[3066]: I1213 14:14:42.306866 3066 topology_manager.go:138] "Creating topology manager with none policy" Dec 13 14:14:42.307177 kubelet[3066]: I1213 14:14:42.306887 3066 container_manager_linux.go:301] "Creating device plugin manager" Dec 13 14:14:42.307177 kubelet[3066]: I1213 14:14:42.306943 3066 state_mem.go:36] "Initialized new in-memory state store" Dec 13 14:14:42.307177 kubelet[3066]: I1213 14:14:42.307127 3066 kubelet.go:396] "Attempting to sync node with API server" Dec 13 14:14:42.307744 kubelet[3066]: I1213 14:14:42.307152 3066 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Dec 13 14:14:42.309090 kubelet[3066]: I1213 14:14:42.308142 3066 kubelet.go:312] "Adding apiserver pod source" Dec 13 14:14:42.319196 kubelet[3066]: I1213 14:14:42.319117 3066 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Dec 13 14:14:42.327211 kubelet[3066]: I1213 14:14:42.327001 3066 kuberuntime_manager.go:258] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Dec 13 14:14:42.330884 kubelet[3066]: I1213 14:14:42.329311 3066 kubelet.go:809] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Dec 13 14:14:42.330884 kubelet[3066]: I1213 14:14:42.330240 3066 server.go:1256] "Started kubelet" Dec 13 14:14:42.336000 audit[3066]: AVC avc: denied { mac_admin } for pid=3066 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:42.336000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:14:42.336000 audit[3066]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000be2030 a1=40008fac18 a2=4000be2000 a3=25 items=0 ppid=1 pid=3066 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:14:42.336000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:14:42.336000 audit[3066]: AVC avc: denied { mac_admin } for pid=3066 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:42.336000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:14:42.336000 audit[3066]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40008c37c0 a1=40008fac30 a2=4000be20c0 a3=25 items=0 ppid=1 pid=3066 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:14:42.336000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:14:42.339739 kubelet[3066]: I1213 14:14:42.336647 3066 kubelet.go:1417] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Dec 13 14:14:42.339739 kubelet[3066]: I1213 14:14:42.336754 3066 kubelet.go:1421] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Dec 13 14:14:42.339739 kubelet[3066]: I1213 14:14:42.336843 3066 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Dec 13 14:14:42.349815 kubelet[3066]: I1213 14:14:42.349701 3066 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Dec 13 14:14:42.351325 kubelet[3066]: I1213 14:14:42.351284 3066 server.go:461] "Adding debug handlers to kubelet server" Dec 13 14:14:42.354089 kubelet[3066]: I1213 14:14:42.353395 3066 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Dec 13 14:14:42.354089 kubelet[3066]: I1213 14:14:42.353785 3066 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Dec 13 14:14:42.369946 kubelet[3066]: I1213 14:14:42.369882 3066 volume_manager.go:291] "Starting Kubelet Volume Manager" Dec 13 14:14:42.377254 kubelet[3066]: I1213 14:14:42.376472 3066 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Dec 13 14:14:42.377254 kubelet[3066]: I1213 14:14:42.376751 3066 reconciler_new.go:29] "Reconciler: start to sync state" Dec 13 14:14:42.388797 kubelet[3066]: I1213 14:14:42.388753 3066 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Dec 13 14:14:42.398389 kubelet[3066]: I1213 14:14:42.397565 3066 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Dec 13 14:14:42.398389 kubelet[3066]: I1213 14:14:42.397621 3066 status_manager.go:217] "Starting to sync pod status with apiserver" Dec 13 14:14:42.398389 kubelet[3066]: I1213 14:14:42.397653 3066 kubelet.go:2329] "Starting kubelet main sync loop" Dec 13 14:14:42.398389 kubelet[3066]: E1213 14:14:42.397744 3066 kubelet.go:2353] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Dec 13 14:14:42.417133 kubelet[3066]: I1213 14:14:42.415387 3066 factory.go:221] Registration of the containerd container factory successfully Dec 13 14:14:42.417133 kubelet[3066]: I1213 14:14:42.415461 3066 factory.go:221] Registration of the systemd container factory successfully Dec 13 14:14:42.417133 kubelet[3066]: I1213 14:14:42.415590 3066 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Dec 13 14:14:42.424038 kubelet[3066]: E1213 14:14:42.423409 3066 kubelet.go:1462] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Dec 13 14:14:42.497406 kubelet[3066]: I1213 14:14:42.496872 3066 kubelet_node_status.go:73] "Attempting to register node" node="ip-172-31-18-231" Dec 13 14:14:42.498322 kubelet[3066]: E1213 14:14:42.497782 3066 kubelet.go:2353] "Skipping pod synchronization" err="container runtime status check may not have completed yet" Dec 13 14:14:42.528241 kubelet[3066]: I1213 14:14:42.528170 3066 kubelet_node_status.go:112] "Node was previously registered" node="ip-172-31-18-231" Dec 13 14:14:42.528410 kubelet[3066]: I1213 14:14:42.528311 3066 kubelet_node_status.go:76] "Successfully registered node" node="ip-172-31-18-231" Dec 13 14:14:42.593540 kubelet[3066]: I1213 14:14:42.593391 3066 cpu_manager.go:214] "Starting CPU manager" policy="none" Dec 13 14:14:42.593765 kubelet[3066]: I1213 14:14:42.593740 3066 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Dec 13 14:14:42.593942 kubelet[3066]: I1213 14:14:42.593920 3066 state_mem.go:36] "Initialized new in-memory state store" Dec 13 14:14:42.594303 kubelet[3066]: I1213 14:14:42.594281 3066 state_mem.go:88] "Updated default CPUSet" cpuSet="" Dec 13 14:14:42.594538 kubelet[3066]: I1213 14:14:42.594517 3066 state_mem.go:96] "Updated CPUSet assignments" assignments={} Dec 13 14:14:42.594651 kubelet[3066]: I1213 14:14:42.594630 3066 policy_none.go:49] "None policy: Start" Dec 13 14:14:42.595775 kubelet[3066]: I1213 14:14:42.595745 3066 memory_manager.go:170] "Starting memorymanager" policy="None" Dec 13 14:14:42.595952 kubelet[3066]: I1213 14:14:42.595931 3066 state_mem.go:35] "Initializing new in-memory state store" Dec 13 14:14:42.596308 kubelet[3066]: I1213 14:14:42.596284 3066 state_mem.go:75] "Updated machine memory state" Dec 13 14:14:42.605328 kubelet[3066]: I1213 14:14:42.605277 3066 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Dec 13 14:14:42.604000 audit[3066]: AVC avc: denied { mac_admin } for pid=3066 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:42.604000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:14:42.604000 audit[3066]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000c8c990 a1=4001129c80 a2=4000c8c960 a3=25 items=0 ppid=1 pid=3066 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:14:42.604000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:14:42.605961 kubelet[3066]: I1213 14:14:42.605397 3066 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Dec 13 14:14:42.608147 kubelet[3066]: I1213 14:14:42.606600 3066 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Dec 13 14:14:42.698624 kubelet[3066]: I1213 14:14:42.698555 3066 topology_manager.go:215] "Topology Admit Handler" podUID="ca3b994e64a190bf87289de9f3f7d15d" podNamespace="kube-system" podName="kube-apiserver-ip-172-31-18-231" Dec 13 14:14:42.698803 kubelet[3066]: I1213 14:14:42.698711 3066 topology_manager.go:215] "Topology Admit Handler" podUID="3e8d3657146926bece42f1354f3006d4" podNamespace="kube-system" podName="kube-controller-manager-ip-172-31-18-231" Dec 13 14:14:42.698871 kubelet[3066]: I1213 14:14:42.698819 3066 topology_manager.go:215] "Topology Admit Handler" podUID="06a9d235d0d5a909753e4080c0ed3d93" podNamespace="kube-system" podName="kube-scheduler-ip-172-31-18-231" Dec 13 14:14:42.708698 kubelet[3066]: E1213 14:14:42.708644 3066 kubelet.go:1921] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ip-172-31-18-231\" already exists" pod="kube-system/kube-apiserver-ip-172-31-18-231" Dec 13 14:14:42.779306 kubelet[3066]: I1213 14:14:42.779258 3066 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/3e8d3657146926bece42f1354f3006d4-k8s-certs\") pod \"kube-controller-manager-ip-172-31-18-231\" (UID: \"3e8d3657146926bece42f1354f3006d4\") " pod="kube-system/kube-controller-manager-ip-172-31-18-231" Dec 13 14:14:42.779525 kubelet[3066]: I1213 14:14:42.779334 3066 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/06a9d235d0d5a909753e4080c0ed3d93-kubeconfig\") pod \"kube-scheduler-ip-172-31-18-231\" (UID: \"06a9d235d0d5a909753e4080c0ed3d93\") " pod="kube-system/kube-scheduler-ip-172-31-18-231" Dec 13 14:14:42.779525 kubelet[3066]: I1213 14:14:42.779392 3066 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/ca3b994e64a190bf87289de9f3f7d15d-ca-certs\") pod \"kube-apiserver-ip-172-31-18-231\" (UID: \"ca3b994e64a190bf87289de9f3f7d15d\") " pod="kube-system/kube-apiserver-ip-172-31-18-231" Dec 13 14:14:42.779525 kubelet[3066]: I1213 14:14:42.779471 3066 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/3e8d3657146926bece42f1354f3006d4-flexvolume-dir\") pod \"kube-controller-manager-ip-172-31-18-231\" (UID: \"3e8d3657146926bece42f1354f3006d4\") " pod="kube-system/kube-controller-manager-ip-172-31-18-231" Dec 13 14:14:42.779525 kubelet[3066]: I1213 14:14:42.779521 3066 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/3e8d3657146926bece42f1354f3006d4-ca-certs\") pod \"kube-controller-manager-ip-172-31-18-231\" (UID: \"3e8d3657146926bece42f1354f3006d4\") " pod="kube-system/kube-controller-manager-ip-172-31-18-231" Dec 13 14:14:42.779788 kubelet[3066]: I1213 14:14:42.779566 3066 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/3e8d3657146926bece42f1354f3006d4-kubeconfig\") pod \"kube-controller-manager-ip-172-31-18-231\" (UID: \"3e8d3657146926bece42f1354f3006d4\") " pod="kube-system/kube-controller-manager-ip-172-31-18-231" Dec 13 14:14:42.779788 kubelet[3066]: I1213 14:14:42.779649 3066 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/3e8d3657146926bece42f1354f3006d4-usr-share-ca-certificates\") pod \"kube-controller-manager-ip-172-31-18-231\" (UID: \"3e8d3657146926bece42f1354f3006d4\") " pod="kube-system/kube-controller-manager-ip-172-31-18-231" Dec 13 14:14:42.779788 kubelet[3066]: I1213 14:14:42.779694 3066 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/ca3b994e64a190bf87289de9f3f7d15d-k8s-certs\") pod \"kube-apiserver-ip-172-31-18-231\" (UID: \"ca3b994e64a190bf87289de9f3f7d15d\") " pod="kube-system/kube-apiserver-ip-172-31-18-231" Dec 13 14:14:42.779788 kubelet[3066]: I1213 14:14:42.779751 3066 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/ca3b994e64a190bf87289de9f3f7d15d-usr-share-ca-certificates\") pod \"kube-apiserver-ip-172-31-18-231\" (UID: \"ca3b994e64a190bf87289de9f3f7d15d\") " pod="kube-system/kube-apiserver-ip-172-31-18-231" Dec 13 14:14:43.320661 kubelet[3066]: I1213 14:14:43.320591 3066 apiserver.go:52] "Watching apiserver" Dec 13 14:14:43.376966 kubelet[3066]: I1213 14:14:43.376903 3066 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Dec 13 14:14:43.507818 kubelet[3066]: I1213 14:14:43.507746 3066 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-scheduler-ip-172-31-18-231" podStartSLOduration=1.507650721 podStartE2EDuration="1.507650721s" podCreationTimestamp="2024-12-13 14:14:42 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:14:43.493059953 +0000 UTC m=+1.335333442" watchObservedRunningTime="2024-12-13 14:14:43.507650721 +0000 UTC m=+1.349924210" Dec 13 14:14:43.540779 kubelet[3066]: I1213 14:14:43.540710 3066 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ip-172-31-18-231" podStartSLOduration=1.540627317 podStartE2EDuration="1.540627317s" podCreationTimestamp="2024-12-13 14:14:42 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:14:43.509527431 +0000 UTC m=+1.351800896" watchObservedRunningTime="2024-12-13 14:14:43.540627317 +0000 UTC m=+1.382900782" Dec 13 14:14:47.293338 sudo[2091]: pam_unix(sudo:session): session closed for user root Dec 13 14:14:47.297454 kernel: kauditd_printk_skb: 269 callbacks suppressed Dec 13 14:14:47.297678 kernel: audit: type=1106 audit(1734099287.292:815): pid=2091 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:14:47.292000 audit[2091]: USER_END pid=2091 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:14:47.293000 audit[2091]: CRED_DISP pid=2091 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:14:47.312057 kernel: audit: type=1104 audit(1734099287.293:816): pid=2091 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:14:47.320655 sshd[2088]: pam_unix(sshd:session): session closed for user core Dec 13 14:14:47.322000 audit[2088]: USER_END pid=2088 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:14:47.326309 systemd[1]: session-7.scope: Deactivated successfully. Dec 13 14:14:47.322000 audit[2088]: CRED_DISP pid=2088 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:14:47.326614 systemd[1]: session-7.scope: Consumed 9.372s CPU time. Dec 13 14:14:47.327384 systemd[1]: sshd@6-172.31.18.231:22-139.178.89.65:49324.service: Deactivated successfully. Dec 13 14:14:47.329317 systemd-logind[1810]: Session 7 logged out. Waiting for processes to exit. Dec 13 14:14:47.330985 systemd-logind[1810]: Removed session 7. Dec 13 14:14:47.344247 kernel: audit: type=1106 audit(1734099287.322:817): pid=2088 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:14:47.344348 kernel: audit: type=1104 audit(1734099287.322:818): pid=2088 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:14:47.344402 kernel: audit: type=1131 audit(1734099287.324:819): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.18.231:22-139.178.89.65:49324 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:14:47.324000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.31.18.231:22-139.178.89.65:49324 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:14:53.630000 audit[2664]: AVC avc: denied { watch } for pid=2664 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=8270 scontext=system_u:system_r:svirt_lxc_net_t:s0:c127,c295 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:14:53.630000 audit[2664]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000c8e1e0 a2=fc6 a3=0 items=0 ppid=2518 pid=2664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c127,c295 key=(null) Dec 13 14:14:53.650974 kernel: audit: type=1400 audit(1734099293.630:820): avc: denied { watch } for pid=2664 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=8270 scontext=system_u:system_r:svirt_lxc_net_t:s0:c127,c295 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:14:53.651190 kernel: audit: type=1300 audit(1734099293.630:820): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000c8e1e0 a2=fc6 a3=0 items=0 ppid=2518 pid=2664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c127,c295 key=(null) Dec 13 14:14:53.651248 kernel: audit: type=1327 audit(1734099293.630:820): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:14:53.630000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:14:53.630000 audit[2664]: AVC avc: denied { watch } for pid=2664 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=8270 scontext=system_u:system_r:svirt_lxc_net_t:s0:c127,c295 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:14:53.669319 kernel: audit: type=1400 audit(1734099293.630:821): avc: denied { watch } for pid=2664 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=8270 scontext=system_u:system_r:svirt_lxc_net_t:s0:c127,c295 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:14:53.669563 kernel: audit: type=1300 audit(1734099293.630:821): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000d00e20 a2=fc6 a3=0 items=0 ppid=2518 pid=2664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c127,c295 key=(null) Dec 13 14:14:53.630000 audit[2664]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000d00e20 a2=fc6 a3=0 items=0 ppid=2518 pid=2664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c127,c295 key=(null) Dec 13 14:14:53.630000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:14:53.690455 kernel: audit: type=1327 audit(1734099293.630:821): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:14:53.690561 kernel: audit: type=1400 audit(1734099293.635:822): avc: denied { watch } for pid=2664 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=8270 scontext=system_u:system_r:svirt_lxc_net_t:s0:c127,c295 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:14:53.635000 audit[2664]: AVC avc: denied { watch } for pid=2664 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=8270 scontext=system_u:system_r:svirt_lxc_net_t:s0:c127,c295 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:14:53.635000 audit[2664]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000c8e560 a2=fc6 a3=0 items=0 ppid=2518 pid=2664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c127,c295 key=(null) Dec 13 14:14:53.711484 kernel: audit: type=1300 audit(1734099293.635:822): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000c8e560 a2=fc6 a3=0 items=0 ppid=2518 pid=2664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c127,c295 key=(null) Dec 13 14:14:53.711703 kernel: audit: type=1327 audit(1734099293.635:822): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:14:53.635000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:14:53.635000 audit[2664]: AVC avc: denied { watch } for pid=2664 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=8270 scontext=system_u:system_r:svirt_lxc_net_t:s0:c127,c295 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:14:53.730794 kernel: audit: type=1400 audit(1734099293.635:823): avc: denied { watch } for pid=2664 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=8270 scontext=system_u:system_r:svirt_lxc_net_t:s0:c127,c295 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:14:53.635000 audit[2664]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000c8e700 a2=fc6 a3=0 items=0 ppid=2518 pid=2664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c127,c295 key=(null) Dec 13 14:14:53.635000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:14:54.425972 kubelet[3066]: I1213 14:14:54.425923 3066 kuberuntime_manager.go:1529] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Dec 13 14:14:54.427645 env[1818]: time="2024-12-13T14:14:54.427491080Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Dec 13 14:14:54.428929 kubelet[3066]: I1213 14:14:54.428880 3066 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Dec 13 14:14:55.060160 kubelet[3066]: I1213 14:14:55.060094 3066 topology_manager.go:215] "Topology Admit Handler" podUID="98dd5e98-901c-4cc9-a002-441d37f5e8f7" podNamespace="kube-system" podName="kube-proxy-sml49" Dec 13 14:14:55.072851 systemd[1]: Created slice kubepods-besteffort-pod98dd5e98_901c_4cc9_a002_441d37f5e8f7.slice. Dec 13 14:14:55.171277 kubelet[3066]: I1213 14:14:55.171231 3066 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/98dd5e98-901c-4cc9-a002-441d37f5e8f7-lib-modules\") pod \"kube-proxy-sml49\" (UID: \"98dd5e98-901c-4cc9-a002-441d37f5e8f7\") " pod="kube-system/kube-proxy-sml49" Dec 13 14:14:55.171524 kubelet[3066]: I1213 14:14:55.171305 3066 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/98dd5e98-901c-4cc9-a002-441d37f5e8f7-kube-proxy\") pod \"kube-proxy-sml49\" (UID: \"98dd5e98-901c-4cc9-a002-441d37f5e8f7\") " pod="kube-system/kube-proxy-sml49" Dec 13 14:14:55.171524 kubelet[3066]: I1213 14:14:55.171358 3066 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-bglmt\" (UniqueName: \"kubernetes.io/projected/98dd5e98-901c-4cc9-a002-441d37f5e8f7-kube-api-access-bglmt\") pod \"kube-proxy-sml49\" (UID: \"98dd5e98-901c-4cc9-a002-441d37f5e8f7\") " pod="kube-system/kube-proxy-sml49" Dec 13 14:14:55.171524 kubelet[3066]: I1213 14:14:55.171405 3066 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/98dd5e98-901c-4cc9-a002-441d37f5e8f7-xtables-lock\") pod \"kube-proxy-sml49\" (UID: \"98dd5e98-901c-4cc9-a002-441d37f5e8f7\") " pod="kube-system/kube-proxy-sml49" Dec 13 14:14:55.392142 env[1818]: time="2024-12-13T14:14:55.391345426Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-sml49,Uid:98dd5e98-901c-4cc9-a002-441d37f5e8f7,Namespace:kube-system,Attempt:0,}" Dec 13 14:14:55.438004 env[1818]: time="2024-12-13T14:14:55.437877857Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:14:55.438589 env[1818]: time="2024-12-13T14:14:55.438025675Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:14:55.438589 env[1818]: time="2024-12-13T14:14:55.438112016Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:14:55.438589 env[1818]: time="2024-12-13T14:14:55.438411636Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c94d4504469d720b250967f9b4368dc62f4f808eb188a2ba5e2f1c7b525a976b pid=3146 runtime=io.containerd.runc.v2 Dec 13 14:14:55.495335 systemd[1]: Started cri-containerd-c94d4504469d720b250967f9b4368dc62f4f808eb188a2ba5e2f1c7b525a976b.scope. Dec 13 14:14:55.530000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:55.530000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:55.530000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:55.530000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:55.530000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:55.530000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:55.530000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:55.530000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:55.530000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:55.530000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:55.530000 audit: BPF prog-id=109 op=LOAD Dec 13 14:14:55.532000 audit[3155]: AVC avc: denied { bpf } for pid=3155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:55.532000 audit[3155]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3146 pid=3155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:14:55.532000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339346434353034343639643732306232353039363766396234333638 Dec 13 14:14:55.532000 audit[3155]: AVC avc: denied { perfmon } for pid=3155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:55.532000 audit[3155]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3146 pid=3155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:14:55.532000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339346434353034343639643732306232353039363766396234333638 Dec 13 14:14:55.533000 audit[3155]: AVC avc: denied { bpf } for pid=3155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:55.533000 audit[3155]: AVC avc: denied { bpf } for pid=3155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:55.533000 audit[3155]: AVC avc: denied { bpf } for pid=3155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:55.533000 audit[3155]: AVC avc: denied { perfmon } for pid=3155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:55.533000 audit[3155]: AVC avc: denied { perfmon } for pid=3155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:55.533000 audit[3155]: AVC avc: denied { perfmon } for pid=3155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:55.533000 audit[3155]: AVC avc: denied { perfmon } for pid=3155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:55.533000 audit[3155]: AVC avc: denied { perfmon } for pid=3155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:55.533000 audit[3155]: AVC avc: denied { bpf } for pid=3155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:55.533000 audit[3155]: AVC avc: denied { bpf } for pid=3155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:55.533000 audit: BPF prog-id=110 op=LOAD Dec 13 14:14:55.533000 audit[3155]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3146 pid=3155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:14:55.533000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339346434353034343639643732306232353039363766396234333638 Dec 13 14:14:55.534000 audit[3155]: AVC avc: denied { bpf } for pid=3155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:55.534000 audit[3155]: AVC avc: denied { bpf } for pid=3155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:55.534000 audit[3155]: AVC avc: denied { perfmon } for pid=3155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:55.534000 audit[3155]: AVC avc: denied { perfmon } for pid=3155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:55.534000 audit[3155]: AVC avc: denied { perfmon } for pid=3155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:55.534000 audit[3155]: AVC avc: denied { perfmon } for pid=3155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:55.534000 audit[3155]: AVC avc: denied { perfmon } for pid=3155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:55.534000 audit[3155]: AVC avc: denied { bpf } for pid=3155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:55.534000 audit[3155]: AVC avc: denied { bpf } for pid=3155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:55.534000 audit: BPF prog-id=111 op=LOAD Dec 13 14:14:55.534000 audit[3155]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3146 pid=3155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:14:55.534000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339346434353034343639643732306232353039363766396234333638 Dec 13 14:14:55.535000 audit: BPF prog-id=111 op=UNLOAD Dec 13 14:14:55.536000 audit: BPF prog-id=110 op=UNLOAD Dec 13 14:14:55.536000 audit[3155]: AVC avc: denied { bpf } for pid=3155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:55.536000 audit[3155]: AVC avc: denied { bpf } for pid=3155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:55.536000 audit[3155]: AVC avc: denied { bpf } for pid=3155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:55.536000 audit[3155]: AVC avc: denied { perfmon } for pid=3155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:55.536000 audit[3155]: AVC avc: denied { perfmon } for pid=3155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:55.536000 audit[3155]: AVC avc: denied { perfmon } for pid=3155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:55.536000 audit[3155]: AVC avc: denied { perfmon } for pid=3155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:55.536000 audit[3155]: AVC avc: denied { perfmon } for pid=3155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:55.536000 audit[3155]: AVC avc: denied { bpf } for pid=3155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:55.536000 audit[3155]: AVC avc: denied { bpf } for pid=3155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:55.536000 audit: BPF prog-id=112 op=LOAD Dec 13 14:14:55.536000 audit[3155]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3146 pid=3155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:14:55.536000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339346434353034343639643732306232353039363766396234333638 Dec 13 14:14:55.566460 env[1818]: time="2024-12-13T14:14:55.565145134Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-sml49,Uid:98dd5e98-901c-4cc9-a002-441d37f5e8f7,Namespace:kube-system,Attempt:0,} returns sandbox id \"c94d4504469d720b250967f9b4368dc62f4f808eb188a2ba5e2f1c7b525a976b\"" Dec 13 14:14:55.577983 env[1818]: time="2024-12-13T14:14:55.577902030Z" level=info msg="CreateContainer within sandbox \"c94d4504469d720b250967f9b4368dc62f4f808eb188a2ba5e2f1c7b525a976b\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Dec 13 14:14:55.632933 env[1818]: time="2024-12-13T14:14:55.632845653Z" level=info msg="CreateContainer within sandbox \"c94d4504469d720b250967f9b4368dc62f4f808eb188a2ba5e2f1c7b525a976b\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"33723215a9436bc0431979d861d00b46d7a68f841834ca1fb75a324b8e1c5522\"" Dec 13 14:14:55.633836 env[1818]: time="2024-12-13T14:14:55.633785746Z" level=info msg="StartContainer for \"33723215a9436bc0431979d861d00b46d7a68f841834ca1fb75a324b8e1c5522\"" Dec 13 14:14:55.684575 kubelet[3066]: I1213 14:14:55.678668 3066 topology_manager.go:215] "Topology Admit Handler" podUID="7c3c46b8-a3b1-4d53-bb68-b90b2f69e1fc" podNamespace="tigera-operator" podName="tigera-operator-c7ccbd65-vfftt" Dec 13 14:14:55.695851 systemd[1]: Created slice kubepods-besteffort-pod7c3c46b8_a3b1_4d53_bb68_b90b2f69e1fc.slice. Dec 13 14:14:55.699634 kubelet[3066]: W1213 14:14:55.699574 3066 reflector.go:539] object-"tigera-operator"/"kubernetes-services-endpoint": failed to list *v1.ConfigMap: configmaps "kubernetes-services-endpoint" is forbidden: User "system:node:ip-172-31-18-231" cannot list resource "configmaps" in API group "" in the namespace "tigera-operator": no relationship found between node 'ip-172-31-18-231' and this object Dec 13 14:14:55.700712 kubelet[3066]: E1213 14:14:55.700651 3066 reflector.go:147] object-"tigera-operator"/"kubernetes-services-endpoint": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "kubernetes-services-endpoint" is forbidden: User "system:node:ip-172-31-18-231" cannot list resource "configmaps" in API group "" in the namespace "tigera-operator": no relationship found between node 'ip-172-31-18-231' and this object Dec 13 14:14:55.700904 kubelet[3066]: W1213 14:14:55.700751 3066 reflector.go:539] object-"tigera-operator"/"kube-root-ca.crt": failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:ip-172-31-18-231" cannot list resource "configmaps" in API group "" in the namespace "tigera-operator": no relationship found between node 'ip-172-31-18-231' and this object Dec 13 14:14:55.700904 kubelet[3066]: E1213 14:14:55.700780 3066 reflector.go:147] object-"tigera-operator"/"kube-root-ca.crt": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:ip-172-31-18-231" cannot list resource "configmaps" in API group "" in the namespace "tigera-operator": no relationship found between node 'ip-172-31-18-231' and this object Dec 13 14:14:55.734834 systemd[1]: Started cri-containerd-33723215a9436bc0431979d861d00b46d7a68f841834ca1fb75a324b8e1c5522.scope. Dec 13 14:14:55.772000 audit[3189]: AVC avc: denied { perfmon } for pid=3189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:55.772000 audit[3189]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001c55a0 a2=3c a3=0 items=0 ppid=3146 pid=3189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:14:55.772000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333373233323135613934333662633034333139373964383631643030 Dec 13 14:14:55.773000 audit[3189]: AVC avc: denied { bpf } for pid=3189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:55.773000 audit[3189]: AVC avc: denied { bpf } for pid=3189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:55.774608 kubelet[3066]: I1213 14:14:55.774527 3066 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/7c3c46b8-a3b1-4d53-bb68-b90b2f69e1fc-var-lib-calico\") pod \"tigera-operator-c7ccbd65-vfftt\" (UID: \"7c3c46b8-a3b1-4d53-bb68-b90b2f69e1fc\") " pod="tigera-operator/tigera-operator-c7ccbd65-vfftt" Dec 13 14:14:55.774729 kubelet[3066]: I1213 14:14:55.774627 3066 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-99ktz\" (UniqueName: \"kubernetes.io/projected/7c3c46b8-a3b1-4d53-bb68-b90b2f69e1fc-kube-api-access-99ktz\") pod \"tigera-operator-c7ccbd65-vfftt\" (UID: \"7c3c46b8-a3b1-4d53-bb68-b90b2f69e1fc\") " pod="tigera-operator/tigera-operator-c7ccbd65-vfftt" Dec 13 14:14:55.773000 audit[3189]: AVC avc: denied { bpf } for pid=3189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:55.773000 audit[3189]: AVC avc: denied { perfmon } for pid=3189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:55.773000 audit[3189]: AVC avc: denied { perfmon } for pid=3189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:55.773000 audit[3189]: AVC avc: denied { perfmon } for pid=3189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:55.773000 audit[3189]: AVC avc: denied { perfmon } for pid=3189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:55.773000 audit[3189]: AVC avc: denied { perfmon } for pid=3189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:55.773000 audit[3189]: AVC avc: denied { bpf } for pid=3189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:55.773000 audit[3189]: AVC avc: denied { bpf } for pid=3189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:55.773000 audit: BPF prog-id=113 op=LOAD Dec 13 14:14:55.773000 audit[3189]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001c58e0 a2=78 a3=0 items=0 ppid=3146 pid=3189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:14:55.773000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333373233323135613934333662633034333139373964383631643030 Dec 13 14:14:55.776000 audit[3189]: AVC avc: denied { bpf } for pid=3189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:55.776000 audit[3189]: AVC avc: denied { bpf } for pid=3189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:55.776000 audit[3189]: AVC avc: denied { perfmon } for pid=3189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:55.776000 audit[3189]: AVC avc: denied { perfmon } for pid=3189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:55.776000 audit[3189]: AVC avc: denied { perfmon } for pid=3189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:55.776000 audit[3189]: AVC avc: denied { perfmon } for pid=3189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:55.776000 audit[3189]: AVC avc: denied { perfmon } for pid=3189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:55.776000 audit[3189]: AVC avc: denied { bpf } for pid=3189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:55.776000 audit[3189]: AVC avc: denied { bpf } for pid=3189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:55.776000 audit: BPF prog-id=114 op=LOAD Dec 13 14:14:55.776000 audit[3189]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001c5670 a2=78 a3=0 items=0 ppid=3146 pid=3189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:14:55.776000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333373233323135613934333662633034333139373964383631643030 Dec 13 14:14:55.777000 audit: BPF prog-id=114 op=UNLOAD Dec 13 14:14:55.777000 audit: BPF prog-id=113 op=UNLOAD Dec 13 14:14:55.777000 audit[3189]: AVC avc: denied { bpf } for pid=3189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:55.777000 audit[3189]: AVC avc: denied { bpf } for pid=3189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:55.777000 audit[3189]: AVC avc: denied { bpf } for pid=3189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:55.777000 audit[3189]: AVC avc: denied { perfmon } for pid=3189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:55.777000 audit[3189]: AVC avc: denied { perfmon } for pid=3189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:55.777000 audit[3189]: AVC avc: denied { perfmon } for pid=3189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:55.777000 audit[3189]: AVC avc: denied { perfmon } for pid=3189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:55.777000 audit[3189]: AVC avc: denied { perfmon } for pid=3189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:55.777000 audit[3189]: AVC avc: denied { bpf } for pid=3189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:55.777000 audit[3189]: AVC avc: denied { bpf } for pid=3189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:55.777000 audit: BPF prog-id=115 op=LOAD Dec 13 14:14:55.777000 audit[3189]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001c5b40 a2=78 a3=0 items=0 ppid=3146 pid=3189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:14:55.777000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333373233323135613934333662633034333139373964383631643030 Dec 13 14:14:55.812797 env[1818]: time="2024-12-13T14:14:55.812712212Z" level=info msg="StartContainer for \"33723215a9436bc0431979d861d00b46d7a68f841834ca1fb75a324b8e1c5522\" returns successfully" Dec 13 14:14:55.930000 audit[3239]: NETFILTER_CFG table=mangle:38 family=10 entries=1 op=nft_register_chain pid=3239 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:14:55.930000 audit[3239]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc29ebdc0 a2=0 a3=1 items=0 ppid=3199 pid=3239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:14:55.930000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 14:14:55.933000 audit[3240]: NETFILTER_CFG table=nat:39 family=10 entries=1 op=nft_register_chain pid=3240 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:14:55.933000 audit[3240]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe1bcd0e0 a2=0 a3=1 items=0 ppid=3199 pid=3240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:14:55.933000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 14:14:55.940000 audit[3241]: NETFILTER_CFG table=filter:40 family=10 entries=1 op=nft_register_chain pid=3241 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:14:55.940000 audit[3241]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe596f580 a2=0 a3=1 items=0 ppid=3199 pid=3241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:14:55.940000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 14:14:55.950000 audit[3242]: NETFILTER_CFG table=mangle:41 family=2 entries=1 op=nft_register_chain pid=3242 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:14:55.950000 audit[3242]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe3b81460 a2=0 a3=1 items=0 ppid=3199 pid=3242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:14:55.950000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 14:14:55.953000 audit[3243]: NETFILTER_CFG table=nat:42 family=2 entries=1 op=nft_register_chain pid=3243 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:14:55.953000 audit[3243]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffed2e2970 a2=0 a3=1 items=0 ppid=3199 pid=3243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:14:55.953000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 14:14:55.956000 audit[3244]: NETFILTER_CFG table=filter:43 family=2 entries=1 op=nft_register_chain pid=3244 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:14:55.956000 audit[3244]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc2ea99b0 a2=0 a3=1 items=0 ppid=3199 pid=3244 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:14:55.956000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 14:14:56.034000 audit[3245]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=3245 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:14:56.034000 audit[3245]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffd91a1d70 a2=0 a3=1 items=0 ppid=3199 pid=3245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:14:56.034000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 14:14:56.040000 audit[3247]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=3247 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:14:56.040000 audit[3247]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffdb614330 a2=0 a3=1 items=0 ppid=3199 pid=3247 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:14:56.040000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Dec 13 14:14:56.047000 audit[3250]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=3250 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:14:56.047000 audit[3250]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffc73e2d60 a2=0 a3=1 items=0 ppid=3199 pid=3250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:14:56.047000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Dec 13 14:14:56.050000 audit[3251]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=3251 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:14:56.050000 audit[3251]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffebce7020 a2=0 a3=1 items=0 ppid=3199 pid=3251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:14:56.050000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 14:14:56.055000 audit[3253]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=3253 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:14:56.055000 audit[3253]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffe0115760 a2=0 a3=1 items=0 ppid=3199 pid=3253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:14:56.055000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 14:14:56.057000 audit[3254]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=3254 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:14:56.057000 audit[3254]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe4ba5aa0 a2=0 a3=1 items=0 ppid=3199 pid=3254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:14:56.057000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 14:14:56.063000 audit[3256]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=3256 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:14:56.063000 audit[3256]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffdc116620 a2=0 a3=1 items=0 ppid=3199 pid=3256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:14:56.063000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 14:14:56.070000 audit[3259]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=3259 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:14:56.070000 audit[3259]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=fffff2461ab0 a2=0 a3=1 items=0 ppid=3199 pid=3259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:14:56.070000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Dec 13 14:14:56.073000 audit[3260]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=3260 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:14:56.073000 audit[3260]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffec0afa80 a2=0 a3=1 items=0 ppid=3199 pid=3260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:14:56.073000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 14:14:56.079000 audit[3262]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=3262 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:14:56.079000 audit[3262]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffe1d40e80 a2=0 a3=1 items=0 ppid=3199 pid=3262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:14:56.079000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 14:14:56.082000 audit[3263]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=3263 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:14:56.082000 audit[3263]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe5fd1980 a2=0 a3=1 items=0 ppid=3199 pid=3263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:14:56.082000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 14:14:56.087000 audit[3265]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=3265 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:14:56.087000 audit[3265]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffcf110030 a2=0 a3=1 items=0 ppid=3199 pid=3265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:14:56.087000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 14:14:56.095000 audit[3268]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=3268 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:14:56.095000 audit[3268]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffffe882650 a2=0 a3=1 items=0 ppid=3199 pid=3268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:14:56.095000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 14:14:56.105000 audit[3271]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=3271 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:14:56.105000 audit[3271]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffd6ce7600 a2=0 a3=1 items=0 ppid=3199 pid=3271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:14:56.105000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 14:14:56.108000 audit[3272]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=3272 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:14:56.108000 audit[3272]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffde9f6820 a2=0 a3=1 items=0 ppid=3199 pid=3272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:14:56.108000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 14:14:56.114000 audit[3274]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=3274 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:14:56.114000 audit[3274]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=524 a0=3 a1=ffffdb2d42d0 a2=0 a3=1 items=0 ppid=3199 pid=3274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:14:56.114000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:14:56.121000 audit[3277]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=3277 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:14:56.121000 audit[3277]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffd1332390 a2=0 a3=1 items=0 ppid=3199 pid=3277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:14:56.121000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:14:56.124000 audit[3278]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=3278 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:14:56.124000 audit[3278]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffdc50cba0 a2=0 a3=1 items=0 ppid=3199 pid=3278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:14:56.124000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 14:14:56.129000 audit[3280]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=3280 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:14:56.129000 audit[3280]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=532 a0=3 a1=fffff5e26be0 a2=0 a3=1 items=0 ppid=3199 pid=3280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:14:56.129000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 14:14:56.171000 audit[3286]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=3286 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:14:56.171000 audit[3286]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5164 a0=3 a1=ffffe2c84270 a2=0 a3=1 items=0 ppid=3199 pid=3286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:14:56.171000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:14:56.186000 audit[3286]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=3286 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:14:56.186000 audit[3286]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5508 a0=3 a1=ffffe2c84270 a2=0 a3=1 items=0 ppid=3199 pid=3286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:14:56.186000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:14:56.189000 audit[3292]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=3292 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:14:56.189000 audit[3292]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=fffff1bbc910 a2=0 a3=1 items=0 ppid=3199 pid=3292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:14:56.189000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 14:14:56.195000 audit[3294]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=3294 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:14:56.195000 audit[3294]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffef1f2660 a2=0 a3=1 items=0 ppid=3199 pid=3294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:14:56.195000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Dec 13 14:14:56.207000 audit[3297]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=3297 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:14:56.207000 audit[3297]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=fffff4271500 a2=0 a3=1 items=0 ppid=3199 pid=3297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:14:56.207000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Dec 13 14:14:56.210000 audit[3298]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=3298 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:14:56.210000 audit[3298]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffdd0eeac0 a2=0 a3=1 items=0 ppid=3199 pid=3298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:14:56.210000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 14:14:56.215000 audit[3300]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=3300 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:14:56.215000 audit[3300]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffe06da340 a2=0 a3=1 items=0 ppid=3199 pid=3300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:14:56.215000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 14:14:56.218000 audit[3301]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=3301 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:14:56.218000 audit[3301]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffffe823b90 a2=0 a3=1 items=0 ppid=3199 pid=3301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:14:56.218000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 14:14:56.223000 audit[3303]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=3303 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:14:56.223000 audit[3303]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=fffffa7b35f0 a2=0 a3=1 items=0 ppid=3199 pid=3303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:14:56.223000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Dec 13 14:14:56.233000 audit[3306]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=3306 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:14:56.233000 audit[3306]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=828 a0=3 a1=ffffc08e60e0 a2=0 a3=1 items=0 ppid=3199 pid=3306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:14:56.233000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 14:14:56.236000 audit[3307]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=3307 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:14:56.236000 audit[3307]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff8314fa0 a2=0 a3=1 items=0 ppid=3199 pid=3307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:14:56.236000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 14:14:56.242000 audit[3309]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=3309 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:14:56.242000 audit[3309]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffdef970b0 a2=0 a3=1 items=0 ppid=3199 pid=3309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:14:56.242000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 14:14:56.245000 audit[3310]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=3310 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:14:56.245000 audit[3310]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffca901e20 a2=0 a3=1 items=0 ppid=3199 pid=3310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:14:56.245000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 14:14:56.250000 audit[3312]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=3312 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:14:56.250000 audit[3312]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffe2a27790 a2=0 a3=1 items=0 ppid=3199 pid=3312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:14:56.250000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 14:14:56.258000 audit[3315]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=3315 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:14:56.258000 audit[3315]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffe246a750 a2=0 a3=1 items=0 ppid=3199 pid=3315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:14:56.258000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 14:14:56.266000 audit[3318]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=3318 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:14:56.266000 audit[3318]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffdd49c080 a2=0 a3=1 items=0 ppid=3199 pid=3318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:14:56.266000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Dec 13 14:14:56.269000 audit[3319]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=3319 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:14:56.269000 audit[3319]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffd8607d80 a2=0 a3=1 items=0 ppid=3199 pid=3319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:14:56.269000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 14:14:56.274000 audit[3321]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=3321 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:14:56.274000 audit[3321]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=fffff2c12b00 a2=0 a3=1 items=0 ppid=3199 pid=3321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:14:56.274000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:14:56.281000 audit[3324]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=3324 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:14:56.281000 audit[3324]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffe04460d0 a2=0 a3=1 items=0 ppid=3199 pid=3324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:14:56.281000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:14:56.284000 audit[3325]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=3325 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:14:56.284000 audit[3325]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff0d32cc0 a2=0 a3=1 items=0 ppid=3199 pid=3325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:14:56.284000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 14:14:56.289000 audit[3327]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=3327 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:14:56.289000 audit[3327]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=ffffc3493ce0 a2=0 a3=1 items=0 ppid=3199 pid=3327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:14:56.289000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 14:14:56.292000 audit[3328]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=3328 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:14:56.292000 audit[3328]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd737d2a0 a2=0 a3=1 items=0 ppid=3199 pid=3328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:14:56.292000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 14:14:56.308000 audit[3330]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=3330 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:14:56.308000 audit[3330]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffe513fca0 a2=0 a3=1 items=0 ppid=3199 pid=3330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:14:56.308000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:14:56.315000 audit[3333]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=3333 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:14:56.315000 audit[3333]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffc9661500 a2=0 a3=1 items=0 ppid=3199 pid=3333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:14:56.315000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:14:56.321000 audit[3335]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=3335 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 14:14:56.321000 audit[3335]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2004 a0=3 a1=fffff82c5d70 a2=0 a3=1 items=0 ppid=3199 pid=3335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:14:56.321000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:14:56.323000 audit[3335]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=3335 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 14:14:56.323000 audit[3335]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2056 a0=3 a1=fffff82c5d70 a2=0 a3=1 items=0 ppid=3199 pid=3335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:14:56.323000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:14:56.515604 kubelet[3066]: I1213 14:14:56.511652 3066 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-sml49" podStartSLOduration=1.511589265 podStartE2EDuration="1.511589265s" podCreationTimestamp="2024-12-13 14:14:55 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:14:56.508777004 +0000 UTC m=+14.351050469" watchObservedRunningTime="2024-12-13 14:14:56.511589265 +0000 UTC m=+14.353862754" Dec 13 14:14:56.888803 kubelet[3066]: E1213 14:14:56.888752 3066 projected.go:294] Couldn't get configMap tigera-operator/kube-root-ca.crt: failed to sync configmap cache: timed out waiting for the condition Dec 13 14:14:56.889583 kubelet[3066]: E1213 14:14:56.889540 3066 projected.go:200] Error preparing data for projected volume kube-api-access-99ktz for pod tigera-operator/tigera-operator-c7ccbd65-vfftt: failed to sync configmap cache: timed out waiting for the condition Dec 13 14:14:56.889857 kubelet[3066]: E1213 14:14:56.889829 3066 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/projected/7c3c46b8-a3b1-4d53-bb68-b90b2f69e1fc-kube-api-access-99ktz podName:7c3c46b8-a3b1-4d53-bb68-b90b2f69e1fc nodeName:}" failed. No retries permitted until 2024-12-13 14:14:57.389791496 +0000 UTC m=+15.232064949 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "kube-api-access-99ktz" (UniqueName: "kubernetes.io/projected/7c3c46b8-a3b1-4d53-bb68-b90b2f69e1fc-kube-api-access-99ktz") pod "tigera-operator-c7ccbd65-vfftt" (UID: "7c3c46b8-a3b1-4d53-bb68-b90b2f69e1fc") : failed to sync configmap cache: timed out waiting for the condition Dec 13 14:14:57.505881 env[1818]: time="2024-12-13T14:14:57.505808914Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-c7ccbd65-vfftt,Uid:7c3c46b8-a3b1-4d53-bb68-b90b2f69e1fc,Namespace:tigera-operator,Attempt:0,}" Dec 13 14:14:57.547093 env[1818]: time="2024-12-13T14:14:57.546932929Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:14:57.547336 env[1818]: time="2024-12-13T14:14:57.547015046Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:14:57.547336 env[1818]: time="2024-12-13T14:14:57.547287978Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:14:57.548093 env[1818]: time="2024-12-13T14:14:57.547962614Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0fb26575dbe041e74112d9b1c0088ad109e3c651669cbeffae97ee76d36bc8ec pid=3345 runtime=io.containerd.runc.v2 Dec 13 14:14:57.605936 systemd[1]: Started cri-containerd-0fb26575dbe041e74112d9b1c0088ad109e3c651669cbeffae97ee76d36bc8ec.scope. Dec 13 14:14:57.637000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:57.637000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:57.637000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:57.637000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:57.637000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:57.637000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:57.637000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:57.637000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:57.637000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:57.637000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:57.637000 audit: BPF prog-id=116 op=LOAD Dec 13 14:14:57.638000 audit[3355]: AVC avc: denied { bpf } for pid=3355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:57.638000 audit[3355]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3345 pid=3355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:14:57.638000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066623236353735646265303431653734313132643962316330303838 Dec 13 14:14:57.638000 audit[3355]: AVC avc: denied { perfmon } for pid=3355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:57.638000 audit[3355]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3345 pid=3355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:14:57.638000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066623236353735646265303431653734313132643962316330303838 Dec 13 14:14:57.638000 audit[3355]: AVC avc: denied { bpf } for pid=3355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:57.638000 audit[3355]: AVC avc: denied { bpf } for pid=3355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:57.638000 audit[3355]: AVC avc: denied { bpf } for pid=3355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:57.638000 audit[3355]: AVC avc: denied { perfmon } for pid=3355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:57.638000 audit[3355]: AVC avc: denied { perfmon } for pid=3355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:57.638000 audit[3355]: AVC avc: denied { perfmon } for pid=3355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:57.638000 audit[3355]: AVC avc: denied { perfmon } for pid=3355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:57.638000 audit[3355]: AVC avc: denied { perfmon } for pid=3355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:57.638000 audit[3355]: AVC avc: denied { bpf } for pid=3355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:57.638000 audit[3355]: AVC avc: denied { bpf } for pid=3355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:57.638000 audit: BPF prog-id=117 op=LOAD Dec 13 14:14:57.638000 audit[3355]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3345 pid=3355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:14:57.638000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066623236353735646265303431653734313132643962316330303838 Dec 13 14:14:57.638000 audit[3355]: AVC avc: denied { bpf } for pid=3355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:57.638000 audit[3355]: AVC avc: denied { bpf } for pid=3355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:57.638000 audit[3355]: AVC avc: denied { perfmon } for pid=3355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:57.638000 audit[3355]: AVC avc: denied { perfmon } for pid=3355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:57.638000 audit[3355]: AVC avc: denied { perfmon } for pid=3355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:57.638000 audit[3355]: AVC avc: denied { perfmon } for pid=3355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:57.638000 audit[3355]: AVC avc: denied { perfmon } for pid=3355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:57.638000 audit[3355]: AVC avc: denied { bpf } for pid=3355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:57.638000 audit[3355]: AVC avc: denied { bpf } for pid=3355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:57.638000 audit: BPF prog-id=118 op=LOAD Dec 13 14:14:57.638000 audit[3355]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3345 pid=3355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:14:57.638000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066623236353735646265303431653734313132643962316330303838 Dec 13 14:14:57.638000 audit: BPF prog-id=118 op=UNLOAD Dec 13 14:14:57.639000 audit: BPF prog-id=117 op=UNLOAD Dec 13 14:14:57.639000 audit[3355]: AVC avc: denied { bpf } for pid=3355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:57.639000 audit[3355]: AVC avc: denied { bpf } for pid=3355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:57.639000 audit[3355]: AVC avc: denied { bpf } for pid=3355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:57.639000 audit[3355]: AVC avc: denied { perfmon } for pid=3355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:57.639000 audit[3355]: AVC avc: denied { perfmon } for pid=3355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:57.639000 audit[3355]: AVC avc: denied { perfmon } for pid=3355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:57.639000 audit[3355]: AVC avc: denied { perfmon } for pid=3355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:57.639000 audit[3355]: AVC avc: denied { perfmon } for pid=3355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:57.639000 audit[3355]: AVC avc: denied { bpf } for pid=3355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:57.639000 audit[3355]: AVC avc: denied { bpf } for pid=3355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:14:57.639000 audit: BPF prog-id=119 op=LOAD Dec 13 14:14:57.639000 audit[3355]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3345 pid=3355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:14:57.639000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066623236353735646265303431653734313132643962316330303838 Dec 13 14:14:57.691805 env[1818]: time="2024-12-13T14:14:57.691744535Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-c7ccbd65-vfftt,Uid:7c3c46b8-a3b1-4d53-bb68-b90b2f69e1fc,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"0fb26575dbe041e74112d9b1c0088ad109e3c651669cbeffae97ee76d36bc8ec\"" Dec 13 14:14:57.698371 env[1818]: time="2024-12-13T14:14:57.698304935Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.2\"" Dec 13 14:14:58.495351 systemd[1]: run-containerd-runc-k8s.io-0fb26575dbe041e74112d9b1c0088ad109e3c651669cbeffae97ee76d36bc8ec-runc.BDnpoa.mount: Deactivated successfully. Dec 13 14:14:59.563447 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2624904505.mount: Deactivated successfully. Dec 13 14:15:00.525726 env[1818]: time="2024-12-13T14:15:00.525660067Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.36.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:15:00.531491 env[1818]: time="2024-12-13T14:15:00.531396182Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:30d521e4e84764b396aacbb2a373ca7a573f84571e3955b34329652acccfb73c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:15:00.535209 env[1818]: time="2024-12-13T14:15:00.535134286Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.36.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:15:00.539027 env[1818]: time="2024-12-13T14:15:00.538968715Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:fc9ea45f2475fd99db1b36d2ff180a50017b1a5ea0e82a171c6b439b3a620764,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:15:00.540638 env[1818]: time="2024-12-13T14:15:00.540573854Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.2\" returns image reference \"sha256:30d521e4e84764b396aacbb2a373ca7a573f84571e3955b34329652acccfb73c\"" Dec 13 14:15:00.548439 env[1818]: time="2024-12-13T14:15:00.547828780Z" level=info msg="CreateContainer within sandbox \"0fb26575dbe041e74112d9b1c0088ad109e3c651669cbeffae97ee76d36bc8ec\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Dec 13 14:15:00.572605 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1725081863.mount: Deactivated successfully. Dec 13 14:15:00.592938 env[1818]: time="2024-12-13T14:15:00.592865406Z" level=info msg="CreateContainer within sandbox \"0fb26575dbe041e74112d9b1c0088ad109e3c651669cbeffae97ee76d36bc8ec\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"af14b09f5f1d6152c27f0b83af7744b180ba56c926bf9509e0332a9c4edf8e6c\"" Dec 13 14:15:00.594195 env[1818]: time="2024-12-13T14:15:00.594115052Z" level=info msg="StartContainer for \"af14b09f5f1d6152c27f0b83af7744b180ba56c926bf9509e0332a9c4edf8e6c\"" Dec 13 14:15:00.643086 systemd[1]: Started cri-containerd-af14b09f5f1d6152c27f0b83af7744b180ba56c926bf9509e0332a9c4edf8e6c.scope. Dec 13 14:15:00.687400 kernel: kauditd_printk_skb: 312 callbacks suppressed Dec 13 14:15:00.687533 kernel: audit: type=1400 audit(1734099300.685:917): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:00.685000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:00.685000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:00.701290 kernel: audit: type=1400 audit(1734099300.685:918): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:00.685000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:00.710343 kernel: audit: type=1400 audit(1734099300.685:919): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:00.685000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:00.685000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:00.732909 kernel: audit: type=1400 audit(1734099300.685:920): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:00.733072 kernel: audit: type=1400 audit(1734099300.685:921): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:00.685000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:00.741172 kernel: audit: type=1400 audit(1734099300.685:922): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:00.685000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:00.751713 kernel: audit: type=1400 audit(1734099300.685:923): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:00.685000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:00.760215 kernel: audit: type=1400 audit(1734099300.685:924): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:00.685000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:00.767978 kernel: audit: type=1400 audit(1734099300.685:925): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:00.686000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:00.686000 audit: BPF prog-id=120 op=LOAD Dec 13 14:15:00.701000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:00.701000 audit[3386]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3345 pid=3386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:00.776515 kernel: audit: type=1400 audit(1734099300.686:926): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:00.701000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166313462303966356631643631353263323766306238336166373734 Dec 13 14:15:00.701000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:00.701000 audit[3386]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3345 pid=3386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:00.701000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166313462303966356631643631353263323766306238336166373734 Dec 13 14:15:00.701000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:00.701000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:00.701000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:00.701000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:00.701000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:00.701000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:00.701000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:00.701000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:00.701000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:00.701000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:00.701000 audit: BPF prog-id=121 op=LOAD Dec 13 14:15:00.701000 audit[3386]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3345 pid=3386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:00.701000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166313462303966356631643631353263323766306238336166373734 Dec 13 14:15:00.701000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:00.701000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:00.701000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:00.701000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:00.701000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:00.701000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:00.701000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:00.701000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:00.701000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:00.701000 audit: BPF prog-id=122 op=LOAD Dec 13 14:15:00.701000 audit[3386]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3345 pid=3386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:00.701000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166313462303966356631643631353263323766306238336166373734 Dec 13 14:15:00.701000 audit: BPF prog-id=122 op=UNLOAD Dec 13 14:15:00.701000 audit: BPF prog-id=121 op=UNLOAD Dec 13 14:15:00.701000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:00.701000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:00.701000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:00.701000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:00.701000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:00.701000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:00.701000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:00.701000 audit[3386]: AVC avc: denied { perfmon } for pid=3386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:00.701000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:00.701000 audit[3386]: AVC avc: denied { bpf } for pid=3386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:00.701000 audit: BPF prog-id=123 op=LOAD Dec 13 14:15:00.701000 audit[3386]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3345 pid=3386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:00.701000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166313462303966356631643631353263323766306238336166373734 Dec 13 14:15:00.780719 env[1818]: time="2024-12-13T14:15:00.780652471Z" level=info msg="StartContainer for \"af14b09f5f1d6152c27f0b83af7744b180ba56c926bf9509e0332a9c4edf8e6c\" returns successfully" Dec 13 14:15:05.138000 audit[3417]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=3417 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:15:05.138000 audit[3417]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5908 a0=3 a1=ffffc837f4f0 a2=0 a3=1 items=0 ppid=3199 pid=3417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:05.138000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:15:05.161000 audit[3417]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=3417 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:15:05.161000 audit[3417]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffc837f4f0 a2=0 a3=1 items=0 ppid=3199 pid=3417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:05.161000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:15:05.195000 audit[3419]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=3419 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:15:05.195000 audit[3419]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5908 a0=3 a1=fffff14010a0 a2=0 a3=1 items=0 ppid=3199 pid=3419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:05.195000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:15:05.205000 audit[3419]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=3419 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:15:05.205000 audit[3419]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=fffff14010a0 a2=0 a3=1 items=0 ppid=3199 pid=3419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:05.205000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:15:06.823000 audit[3422]: NETFILTER_CFG table=filter:93 family=2 entries=17 op=nft_register_rule pid=3422 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:15:06.827652 kernel: kauditd_printk_skb: 59 callbacks suppressed Dec 13 14:15:06.827812 kernel: audit: type=1325 audit(1734099306.823:939): table=filter:93 family=2 entries=17 op=nft_register_rule pid=3422 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:15:06.823000 audit[3422]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6652 a0=3 a1=fffff9d2cb80 a2=0 a3=1 items=0 ppid=3199 pid=3422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:06.847222 kernel: audit: type=1300 audit(1734099306.823:939): arch=c00000b7 syscall=211 success=yes exit=6652 a0=3 a1=fffff9d2cb80 a2=0 a3=1 items=0 ppid=3199 pid=3422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:06.823000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:15:06.852982 kernel: audit: type=1327 audit(1734099306.823:939): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:15:06.852000 audit[3422]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=3422 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:15:06.852000 audit[3422]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=fffff9d2cb80 a2=0 a3=1 items=0 ppid=3199 pid=3422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:06.870727 kernel: audit: type=1325 audit(1734099306.852:940): table=nat:94 family=2 entries=12 op=nft_register_rule pid=3422 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:15:06.870924 kernel: audit: type=1300 audit(1734099306.852:940): arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=fffff9d2cb80 a2=0 a3=1 items=0 ppid=3199 pid=3422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:06.852000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:15:06.877635 kernel: audit: type=1327 audit(1734099306.852:940): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:15:06.918892 kubelet[3066]: I1213 14:15:06.918829 3066 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="tigera-operator/tigera-operator-c7ccbd65-vfftt" podStartSLOduration=9.071359264 podStartE2EDuration="11.918737727s" podCreationTimestamp="2024-12-13 14:14:55 +0000 UTC" firstStartedPulling="2024-12-13 14:14:57.694754546 +0000 UTC m=+15.537027987" lastFinishedPulling="2024-12-13 14:15:00.542132985 +0000 UTC m=+18.384406450" observedRunningTime="2024-12-13 14:15:01.531385616 +0000 UTC m=+19.373659093" watchObservedRunningTime="2024-12-13 14:15:06.918737727 +0000 UTC m=+24.761011276" Dec 13 14:15:06.920033 kubelet[3066]: I1213 14:15:06.919978 3066 topology_manager.go:215] "Topology Admit Handler" podUID="4a5ecedf-5e28-49c0-ad26-6312e7192a33" podNamespace="calico-system" podName="calico-typha-6854c48c8d-hnpcd" Dec 13 14:15:06.932530 systemd[1]: Created slice kubepods-besteffort-pod4a5ecedf_5e28_49c0_ad26_6312e7192a33.slice. Dec 13 14:15:06.954042 kubelet[3066]: I1213 14:15:06.953976 3066 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/4a5ecedf-5e28-49c0-ad26-6312e7192a33-tigera-ca-bundle\") pod \"calico-typha-6854c48c8d-hnpcd\" (UID: \"4a5ecedf-5e28-49c0-ad26-6312e7192a33\") " pod="calico-system/calico-typha-6854c48c8d-hnpcd" Dec 13 14:15:06.954402 kubelet[3066]: I1213 14:15:06.954374 3066 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-frzh6\" (UniqueName: \"kubernetes.io/projected/4a5ecedf-5e28-49c0-ad26-6312e7192a33-kube-api-access-frzh6\") pod \"calico-typha-6854c48c8d-hnpcd\" (UID: \"4a5ecedf-5e28-49c0-ad26-6312e7192a33\") " pod="calico-system/calico-typha-6854c48c8d-hnpcd" Dec 13 14:15:06.954673 kubelet[3066]: I1213 14:15:06.954643 3066 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/4a5ecedf-5e28-49c0-ad26-6312e7192a33-typha-certs\") pod \"calico-typha-6854c48c8d-hnpcd\" (UID: \"4a5ecedf-5e28-49c0-ad26-6312e7192a33\") " pod="calico-system/calico-typha-6854c48c8d-hnpcd" Dec 13 14:15:07.130655 kubelet[3066]: I1213 14:15:07.130498 3066 topology_manager.go:215] "Topology Admit Handler" podUID="2fa9a11d-d397-4cc4-ae12-8f21933bf29d" podNamespace="calico-system" podName="calico-node-sfn7p" Dec 13 14:15:07.155786 systemd[1]: Created slice kubepods-besteffort-pod2fa9a11d_d397_4cc4_ae12_8f21933bf29d.slice. Dec 13 14:15:07.157112 kubelet[3066]: I1213 14:15:07.157078 3066 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/2fa9a11d-d397-4cc4-ae12-8f21933bf29d-cni-bin-dir\") pod \"calico-node-sfn7p\" (UID: \"2fa9a11d-d397-4cc4-ae12-8f21933bf29d\") " pod="calico-system/calico-node-sfn7p" Dec 13 14:15:07.157331 kubelet[3066]: I1213 14:15:07.157308 3066 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-fhcsn\" (UniqueName: \"kubernetes.io/projected/2fa9a11d-d397-4cc4-ae12-8f21933bf29d-kube-api-access-fhcsn\") pod \"calico-node-sfn7p\" (UID: \"2fa9a11d-d397-4cc4-ae12-8f21933bf29d\") " pod="calico-system/calico-node-sfn7p" Dec 13 14:15:07.157536 kubelet[3066]: I1213 14:15:07.157512 3066 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/2fa9a11d-d397-4cc4-ae12-8f21933bf29d-policysync\") pod \"calico-node-sfn7p\" (UID: \"2fa9a11d-d397-4cc4-ae12-8f21933bf29d\") " pod="calico-system/calico-node-sfn7p" Dec 13 14:15:07.157720 kubelet[3066]: I1213 14:15:07.157697 3066 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/2fa9a11d-d397-4cc4-ae12-8f21933bf29d-xtables-lock\") pod \"calico-node-sfn7p\" (UID: \"2fa9a11d-d397-4cc4-ae12-8f21933bf29d\") " pod="calico-system/calico-node-sfn7p" Dec 13 14:15:07.157875 kubelet[3066]: I1213 14:15:07.157852 3066 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/2fa9a11d-d397-4cc4-ae12-8f21933bf29d-var-lib-calico\") pod \"calico-node-sfn7p\" (UID: \"2fa9a11d-d397-4cc4-ae12-8f21933bf29d\") " pod="calico-system/calico-node-sfn7p" Dec 13 14:15:07.158033 kubelet[3066]: I1213 14:15:07.158011 3066 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/2fa9a11d-d397-4cc4-ae12-8f21933bf29d-cni-net-dir\") pod \"calico-node-sfn7p\" (UID: \"2fa9a11d-d397-4cc4-ae12-8f21933bf29d\") " pod="calico-system/calico-node-sfn7p" Dec 13 14:15:07.158202 kubelet[3066]: I1213 14:15:07.158180 3066 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/2fa9a11d-d397-4cc4-ae12-8f21933bf29d-tigera-ca-bundle\") pod \"calico-node-sfn7p\" (UID: \"2fa9a11d-d397-4cc4-ae12-8f21933bf29d\") " pod="calico-system/calico-node-sfn7p" Dec 13 14:15:07.158374 kubelet[3066]: I1213 14:15:07.158351 3066 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/2fa9a11d-d397-4cc4-ae12-8f21933bf29d-node-certs\") pod \"calico-node-sfn7p\" (UID: \"2fa9a11d-d397-4cc4-ae12-8f21933bf29d\") " pod="calico-system/calico-node-sfn7p" Dec 13 14:15:07.158598 kubelet[3066]: I1213 14:15:07.158572 3066 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/2fa9a11d-d397-4cc4-ae12-8f21933bf29d-cni-log-dir\") pod \"calico-node-sfn7p\" (UID: \"2fa9a11d-d397-4cc4-ae12-8f21933bf29d\") " pod="calico-system/calico-node-sfn7p" Dec 13 14:15:07.158760 kubelet[3066]: I1213 14:15:07.158738 3066 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/2fa9a11d-d397-4cc4-ae12-8f21933bf29d-lib-modules\") pod \"calico-node-sfn7p\" (UID: \"2fa9a11d-d397-4cc4-ae12-8f21933bf29d\") " pod="calico-system/calico-node-sfn7p" Dec 13 14:15:07.158922 kubelet[3066]: I1213 14:15:07.158898 3066 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/2fa9a11d-d397-4cc4-ae12-8f21933bf29d-var-run-calico\") pod \"calico-node-sfn7p\" (UID: \"2fa9a11d-d397-4cc4-ae12-8f21933bf29d\") " pod="calico-system/calico-node-sfn7p" Dec 13 14:15:07.159067 kubelet[3066]: I1213 14:15:07.159046 3066 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/2fa9a11d-d397-4cc4-ae12-8f21933bf29d-flexvol-driver-host\") pod \"calico-node-sfn7p\" (UID: \"2fa9a11d-d397-4cc4-ae12-8f21933bf29d\") " pod="calico-system/calico-node-sfn7p" Dec 13 14:15:07.238929 env[1818]: time="2024-12-13T14:15:07.238837373Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-6854c48c8d-hnpcd,Uid:4a5ecedf-5e28-49c0-ad26-6312e7192a33,Namespace:calico-system,Attempt:0,}" Dec 13 14:15:07.279452 kubelet[3066]: E1213 14:15:07.278545 3066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:07.279452 kubelet[3066]: W1213 14:15:07.278587 3066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:07.279452 kubelet[3066]: E1213 14:15:07.278634 3066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:07.279452 kubelet[3066]: E1213 14:15:07.279052 3066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:07.279452 kubelet[3066]: W1213 14:15:07.279079 3066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:07.279452 kubelet[3066]: E1213 14:15:07.279111 3066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:07.279998 kubelet[3066]: E1213 14:15:07.279477 3066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:07.279998 kubelet[3066]: W1213 14:15:07.279497 3066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:07.279998 kubelet[3066]: E1213 14:15:07.279526 3066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:07.283004 kubelet[3066]: E1213 14:15:07.282959 3066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:07.283004 kubelet[3066]: W1213 14:15:07.282994 3066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:07.283241 kubelet[3066]: E1213 14:15:07.283037 3066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:07.291893 env[1818]: time="2024-12-13T14:15:07.289112347Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:15:07.291893 env[1818]: time="2024-12-13T14:15:07.289178515Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:15:07.291893 env[1818]: time="2024-12-13T14:15:07.289204484Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:15:07.291893 env[1818]: time="2024-12-13T14:15:07.289436482Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/93eb0d4c8667c663dbbdb1c84e61639095717a0cb5aa8cce94c8c09f9b64a563 pid=3431 runtime=io.containerd.runc.v2 Dec 13 14:15:07.294511 kubelet[3066]: E1213 14:15:07.292709 3066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:07.294511 kubelet[3066]: W1213 14:15:07.292749 3066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:07.294511 kubelet[3066]: E1213 14:15:07.292790 3066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:07.294511 kubelet[3066]: E1213 14:15:07.293210 3066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:07.294511 kubelet[3066]: W1213 14:15:07.293230 3066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:07.294511 kubelet[3066]: E1213 14:15:07.293259 3066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:07.294511 kubelet[3066]: E1213 14:15:07.293582 3066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:07.294511 kubelet[3066]: W1213 14:15:07.293600 3066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:07.294511 kubelet[3066]: E1213 14:15:07.293627 3066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:07.295156 kubelet[3066]: E1213 14:15:07.294575 3066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:07.295156 kubelet[3066]: W1213 14:15:07.294604 3066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:07.295156 kubelet[3066]: E1213 14:15:07.294644 3066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:07.320911 kubelet[3066]: E1213 14:15:07.320858 3066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:07.320911 kubelet[3066]: W1213 14:15:07.320897 3066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:07.321145 kubelet[3066]: E1213 14:15:07.320935 3066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:07.321969 kubelet[3066]: E1213 14:15:07.321937 3066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:07.322165 kubelet[3066]: W1213 14:15:07.322136 3066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:07.322313 kubelet[3066]: E1213 14:15:07.322288 3066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:07.335407 kubelet[3066]: E1213 14:15:07.335355 3066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:07.335407 kubelet[3066]: W1213 14:15:07.335395 3066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:07.335693 kubelet[3066]: E1213 14:15:07.335455 3066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:07.362975 systemd[1]: Started cri-containerd-93eb0d4c8667c663dbbdb1c84e61639095717a0cb5aa8cce94c8c09f9b64a563.scope. Dec 13 14:15:07.411239 kubelet[3066]: I1213 14:15:07.411090 3066 topology_manager.go:215] "Topology Admit Handler" podUID="598fbb62-2ff1-4c40-b8a5-720bd020a409" podNamespace="calico-system" podName="csi-node-driver-r2mtx" Dec 13 14:15:07.412105 kubelet[3066]: E1213 14:15:07.412069 3066 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-r2mtx" podUID="598fbb62-2ff1-4c40-b8a5-720bd020a409" Dec 13 14:15:07.446715 kubelet[3066]: E1213 14:15:07.446650 3066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:07.446977 kubelet[3066]: W1213 14:15:07.446947 3066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:07.447151 kubelet[3066]: E1213 14:15:07.447124 3066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:07.447933 kubelet[3066]: E1213 14:15:07.447885 3066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:07.448174 kubelet[3066]: W1213 14:15:07.448139 3066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:07.448356 kubelet[3066]: E1213 14:15:07.448332 3066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:07.450649 kubelet[3066]: E1213 14:15:07.450610 3066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:07.450871 kubelet[3066]: W1213 14:15:07.450838 3066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:07.451073 kubelet[3066]: E1213 14:15:07.451050 3066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:07.451746 kubelet[3066]: E1213 14:15:07.451714 3066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:07.451957 kubelet[3066]: W1213 14:15:07.451930 3066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:07.452110 kubelet[3066]: E1213 14:15:07.452089 3066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:07.454620 kubelet[3066]: E1213 14:15:07.454580 3066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:07.454836 kubelet[3066]: W1213 14:15:07.454807 3066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:07.455030 kubelet[3066]: E1213 14:15:07.455006 3066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:07.456642 kubelet[3066]: E1213 14:15:07.456605 3066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:07.456918 kubelet[3066]: W1213 14:15:07.456885 3066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:07.457071 kubelet[3066]: E1213 14:15:07.457047 3066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:07.459657 kubelet[3066]: E1213 14:15:07.459618 3066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:07.459877 kubelet[3066]: W1213 14:15:07.459847 3066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:07.460024 kubelet[3066]: E1213 14:15:07.460000 3066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:07.462046 kubelet[3066]: E1213 14:15:07.462007 3066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:07.462294 kubelet[3066]: W1213 14:15:07.462262 3066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:07.462512 kubelet[3066]: E1213 14:15:07.462465 3066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:07.463707 kubelet[3066]: E1213 14:15:07.463669 3066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:07.463954 kubelet[3066]: W1213 14:15:07.463921 3066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:07.464104 kubelet[3066]: E1213 14:15:07.464080 3066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:07.464692 kubelet[3066]: E1213 14:15:07.464664 3066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:07.464889 kubelet[3066]: W1213 14:15:07.464861 3066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:07.465014 kubelet[3066]: E1213 14:15:07.464992 3066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:07.465539 kubelet[3066]: E1213 14:15:07.465513 3066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:07.465689 kubelet[3066]: W1213 14:15:07.465664 3066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:07.465841 kubelet[3066]: E1213 14:15:07.465819 3066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:07.469387 kubelet[3066]: E1213 14:15:07.469346 3066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:07.469688 kubelet[3066]: W1213 14:15:07.469657 3066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:07.469844 kubelet[3066]: E1213 14:15:07.469818 3066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:07.471643 kubelet[3066]: E1213 14:15:07.471604 3066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:07.471841 kubelet[3066]: W1213 14:15:07.471811 3066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:07.471999 kubelet[3066]: E1213 14:15:07.471976 3066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:07.472590 kubelet[3066]: E1213 14:15:07.472555 3066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:07.472843 kubelet[3066]: W1213 14:15:07.472808 3066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:07.473000 kubelet[3066]: E1213 14:15:07.472977 3066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:07.473588 kubelet[3066]: E1213 14:15:07.473558 3066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:07.473763 kubelet[3066]: W1213 14:15:07.473736 3066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:07.473922 kubelet[3066]: E1213 14:15:07.473898 3066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:07.475662 kubelet[3066]: E1213 14:15:07.475624 3066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:07.476147 kubelet[3066]: W1213 14:15:07.476111 3066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:07.476321 kubelet[3066]: E1213 14:15:07.476297 3066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:07.477826 env[1818]: time="2024-12-13T14:15:07.477303799Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-sfn7p,Uid:2fa9a11d-d397-4cc4-ae12-8f21933bf29d,Namespace:calico-system,Attempt:0,}" Dec 13 14:15:07.478000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:07.488997 kubelet[3066]: E1213 14:15:07.488959 3066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:07.489231 kubelet[3066]: W1213 14:15:07.489196 3066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:07.490514 kubelet[3066]: E1213 14:15:07.489363 3066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:07.490514 kubelet[3066]: I1213 14:15:07.489440 3066 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/598fbb62-2ff1-4c40-b8a5-720bd020a409-registration-dir\") pod \"csi-node-driver-r2mtx\" (UID: \"598fbb62-2ff1-4c40-b8a5-720bd020a409\") " pod="calico-system/csi-node-driver-r2mtx" Dec 13 14:15:07.490514 kubelet[3066]: E1213 14:15:07.489821 3066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:07.490514 kubelet[3066]: W1213 14:15:07.489846 3066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:07.490514 kubelet[3066]: E1213 14:15:07.489894 3066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:07.491175 kubelet[3066]: E1213 14:15:07.491127 3066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:07.491175 kubelet[3066]: W1213 14:15:07.491168 3066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:07.491382 kubelet[3066]: E1213 14:15:07.491209 3066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:07.493032 kubelet[3066]: E1213 14:15:07.492982 3066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:07.493032 kubelet[3066]: W1213 14:15:07.493023 3066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:07.493356 kubelet[3066]: E1213 14:15:07.493325 3066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:07.486000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:07.501394 kernel: audit: type=1400 audit(1734099307.478:941): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:07.501613 kernel: audit: type=1400 audit(1734099307.486:942): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:07.502852 kubelet[3066]: E1213 14:15:07.502044 3066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:07.502852 kubelet[3066]: W1213 14:15:07.502081 3066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:07.503065 kubelet[3066]: E1213 14:15:07.502944 3066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:07.503065 kubelet[3066]: W1213 14:15:07.502980 3066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:07.503290 kubelet[3066]: E1213 14:15:07.503262 3066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:07.503460 kubelet[3066]: E1213 14:15:07.503399 3066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:07.503460 kubelet[3066]: E1213 14:15:07.503359 3066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:07.503606 kubelet[3066]: W1213 14:15:07.503470 3066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:07.503606 kubelet[3066]: E1213 14:15:07.503500 3066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:07.503772 kubelet[3066]: I1213 14:15:07.503745 3066 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/598fbb62-2ff1-4c40-b8a5-720bd020a409-kubelet-dir\") pod \"csi-node-driver-r2mtx\" (UID: \"598fbb62-2ff1-4c40-b8a5-720bd020a409\") " pod="calico-system/csi-node-driver-r2mtx" Dec 13 14:15:07.503899 kubelet[3066]: E1213 14:15:07.503843 3066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:07.504033 kubelet[3066]: W1213 14:15:07.504007 3066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:07.504183 kubelet[3066]: E1213 14:15:07.504159 3066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:07.486000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:07.504887 kubelet[3066]: E1213 14:15:07.504860 3066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:07.505052 kubelet[3066]: W1213 14:15:07.505025 3066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:07.505199 kubelet[3066]: E1213 14:15:07.505177 3066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:07.511465 kernel: audit: type=1400 audit(1734099307.486:943): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:07.514544 kubelet[3066]: E1213 14:15:07.512671 3066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:07.514544 kubelet[3066]: W1213 14:15:07.512702 3066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:07.514544 kubelet[3066]: E1213 14:15:07.512741 3066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:07.514544 kubelet[3066]: I1213 14:15:07.512788 3066 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/598fbb62-2ff1-4c40-b8a5-720bd020a409-socket-dir\") pod \"csi-node-driver-r2mtx\" (UID: \"598fbb62-2ff1-4c40-b8a5-720bd020a409\") " pod="calico-system/csi-node-driver-r2mtx" Dec 13 14:15:07.486000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:07.515506 kubelet[3066]: E1213 14:15:07.515128 3066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:07.515506 kubelet[3066]: W1213 14:15:07.515162 3066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:07.515506 kubelet[3066]: E1213 14:15:07.515199 3066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:07.522151 kernel: audit: type=1400 audit(1734099307.486:944): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:07.522836 kubelet[3066]: E1213 14:15:07.522564 3066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:07.522836 kubelet[3066]: W1213 14:15:07.522597 3066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:07.522836 kubelet[3066]: E1213 14:15:07.522657 3066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:07.523785 kubelet[3066]: E1213 14:15:07.523517 3066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:07.523785 kubelet[3066]: W1213 14:15:07.523549 3066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:07.523785 kubelet[3066]: E1213 14:15:07.523734 3066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:07.486000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:07.486000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:07.486000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:07.486000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:07.486000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:07.486000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:07.486000 audit: BPF prog-id=124 op=LOAD Dec 13 14:15:07.487000 audit[3452]: AVC avc: denied { bpf } for pid=3452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:07.487000 audit[3452]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3431 pid=3452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:07.487000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933656230643463383636376336363364626264623163383465363136 Dec 13 14:15:07.488000 audit[3452]: AVC avc: denied { perfmon } for pid=3452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:07.488000 audit[3452]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3431 pid=3452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:07.488000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933656230643463383636376336363364626264623163383465363136 Dec 13 14:15:07.488000 audit[3452]: AVC avc: denied { bpf } for pid=3452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:07.488000 audit[3452]: AVC avc: denied { bpf } for pid=3452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:07.488000 audit[3452]: AVC avc: denied { bpf } for pid=3452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:07.488000 audit[3452]: AVC avc: denied { perfmon } for pid=3452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:07.488000 audit[3452]: AVC avc: denied { perfmon } for pid=3452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:07.488000 audit[3452]: AVC avc: denied { perfmon } for pid=3452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:07.488000 audit[3452]: AVC avc: denied { perfmon } for pid=3452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:07.488000 audit[3452]: AVC avc: denied { perfmon } for pid=3452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:07.488000 audit[3452]: AVC avc: denied { bpf } for pid=3452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:07.488000 audit[3452]: AVC avc: denied { bpf } for pid=3452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:07.488000 audit: BPF prog-id=125 op=LOAD Dec 13 14:15:07.488000 audit[3452]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3431 pid=3452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:07.488000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933656230643463383636376336363364626264623163383465363136 Dec 13 14:15:07.489000 audit[3452]: AVC avc: denied { bpf } for pid=3452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:07.489000 audit[3452]: AVC avc: denied { bpf } for pid=3452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:07.489000 audit[3452]: AVC avc: denied { perfmon } for pid=3452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:07.489000 audit[3452]: AVC avc: denied { perfmon } for pid=3452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:07.489000 audit[3452]: AVC avc: denied { perfmon } for pid=3452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:07.489000 audit[3452]: AVC avc: denied { perfmon } for pid=3452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:07.489000 audit[3452]: AVC avc: denied { perfmon } for pid=3452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:07.489000 audit[3452]: AVC avc: denied { bpf } for pid=3452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:07.489000 audit[3452]: AVC avc: denied { bpf } for pid=3452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:07.489000 audit: BPF prog-id=126 op=LOAD Dec 13 14:15:07.489000 audit[3452]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3431 pid=3452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:07.489000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933656230643463383636376336363364626264623163383465363136 Dec 13 14:15:07.489000 audit: BPF prog-id=126 op=UNLOAD Dec 13 14:15:07.489000 audit: BPF prog-id=125 op=UNLOAD Dec 13 14:15:07.492000 audit[3452]: AVC avc: denied { bpf } for pid=3452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:07.492000 audit[3452]: AVC avc: denied { bpf } for pid=3452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:07.492000 audit[3452]: AVC avc: denied { bpf } for pid=3452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:07.492000 audit[3452]: AVC avc: denied { perfmon } for pid=3452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:07.492000 audit[3452]: AVC avc: denied { perfmon } for pid=3452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:07.492000 audit[3452]: AVC avc: denied { perfmon } for pid=3452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:07.492000 audit[3452]: AVC avc: denied { perfmon } for pid=3452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:07.492000 audit[3452]: AVC avc: denied { perfmon } for pid=3452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:07.492000 audit[3452]: AVC avc: denied { bpf } for pid=3452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:07.492000 audit[3452]: AVC avc: denied { bpf } for pid=3452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:07.492000 audit: BPF prog-id=127 op=LOAD Dec 13 14:15:07.492000 audit[3452]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3431 pid=3452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:07.492000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933656230643463383636376336363364626264623163383465363136 Dec 13 14:15:07.538955 kubelet[3066]: E1213 14:15:07.524169 3066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:07.538955 kubelet[3066]: W1213 14:15:07.524194 3066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:07.538955 kubelet[3066]: E1213 14:15:07.524224 3066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:07.538955 kubelet[3066]: I1213 14:15:07.524284 3066 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/598fbb62-2ff1-4c40-b8a5-720bd020a409-varrun\") pod \"csi-node-driver-r2mtx\" (UID: \"598fbb62-2ff1-4c40-b8a5-720bd020a409\") " pod="calico-system/csi-node-driver-r2mtx" Dec 13 14:15:07.538955 kubelet[3066]: E1213 14:15:07.533658 3066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:07.538955 kubelet[3066]: W1213 14:15:07.533685 3066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:07.538955 kubelet[3066]: E1213 14:15:07.533722 3066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:07.538955 kubelet[3066]: E1213 14:15:07.538616 3066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:07.538955 kubelet[3066]: W1213 14:15:07.538647 3066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:07.539677 kubelet[3066]: E1213 14:15:07.538685 3066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:07.547081 env[1818]: time="2024-12-13T14:15:07.546925387Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:15:07.547553 env[1818]: time="2024-12-13T14:15:07.547347527Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:15:07.547818 env[1818]: time="2024-12-13T14:15:07.547728711Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:15:07.548335 env[1818]: time="2024-12-13T14:15:07.548231996Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ffb4b3567f5bfcf93f2680a29cfffd6d26d8cf1bc3d5e3c7714b1c74b6c57c6b pid=3510 runtime=io.containerd.runc.v2 Dec 13 14:15:07.591718 env[1818]: time="2024-12-13T14:15:07.591659198Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-6854c48c8d-hnpcd,Uid:4a5ecedf-5e28-49c0-ad26-6312e7192a33,Namespace:calico-system,Attempt:0,} returns sandbox id \"93eb0d4c8667c663dbbdb1c84e61639095717a0cb5aa8cce94c8c09f9b64a563\"" Dec 13 14:15:07.598113 env[1818]: time="2024-12-13T14:15:07.598053929Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.1\"" Dec 13 14:15:07.606704 systemd[1]: Started cri-containerd-ffb4b3567f5bfcf93f2680a29cfffd6d26d8cf1bc3d5e3c7714b1c74b6c57c6b.scope. Dec 13 14:15:07.626007 kubelet[3066]: E1213 14:15:07.625523 3066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:07.626007 kubelet[3066]: W1213 14:15:07.625579 3066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:07.626007 kubelet[3066]: E1213 14:15:07.625642 3066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:07.626833 kubelet[3066]: E1213 14:15:07.626541 3066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:07.626833 kubelet[3066]: W1213 14:15:07.626574 3066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:07.626833 kubelet[3066]: E1213 14:15:07.626649 3066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:07.626833 kubelet[3066]: I1213 14:15:07.626722 3066 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-9cgsd\" (UniqueName: \"kubernetes.io/projected/598fbb62-2ff1-4c40-b8a5-720bd020a409-kube-api-access-9cgsd\") pod \"csi-node-driver-r2mtx\" (UID: \"598fbb62-2ff1-4c40-b8a5-720bd020a409\") " pod="calico-system/csi-node-driver-r2mtx" Dec 13 14:15:07.627213 kubelet[3066]: E1213 14:15:07.627043 3066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:07.627213 kubelet[3066]: W1213 14:15:07.627066 3066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:07.627213 kubelet[3066]: E1213 14:15:07.627109 3066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:07.627473 kubelet[3066]: E1213 14:15:07.627408 3066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:07.627473 kubelet[3066]: W1213 14:15:07.627456 3066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:07.627662 kubelet[3066]: E1213 14:15:07.627497 3066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:07.627858 kubelet[3066]: E1213 14:15:07.627825 3066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:07.627858 kubelet[3066]: W1213 14:15:07.627852 3066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:07.628051 kubelet[3066]: E1213 14:15:07.627900 3066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:07.628330 kubelet[3066]: E1213 14:15:07.628298 3066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:07.628330 kubelet[3066]: W1213 14:15:07.628325 3066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:07.630673 kubelet[3066]: E1213 14:15:07.628773 3066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:07.630673 kubelet[3066]: W1213 14:15:07.628795 3066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:07.630673 kubelet[3066]: E1213 14:15:07.629183 3066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:07.630673 kubelet[3066]: W1213 14:15:07.629200 3066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:07.630673 kubelet[3066]: E1213 14:15:07.629227 3066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:07.630673 kubelet[3066]: E1213 14:15:07.629521 3066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:07.630673 kubelet[3066]: W1213 14:15:07.629537 3066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:07.630673 kubelet[3066]: E1213 14:15:07.629569 3066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:07.630673 kubelet[3066]: E1213 14:15:07.629609 3066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:07.630673 kubelet[3066]: E1213 14:15:07.629647 3066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:07.631219 kubelet[3066]: E1213 14:15:07.630039 3066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:07.631219 kubelet[3066]: W1213 14:15:07.630061 3066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:07.631219 kubelet[3066]: E1213 14:15:07.630185 3066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:07.631219 kubelet[3066]: E1213 14:15:07.630620 3066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:07.631219 kubelet[3066]: W1213 14:15:07.630642 3066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:07.631219 kubelet[3066]: E1213 14:15:07.630678 3066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:07.631919 kubelet[3066]: E1213 14:15:07.631731 3066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:07.631919 kubelet[3066]: W1213 14:15:07.631761 3066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:07.631919 kubelet[3066]: E1213 14:15:07.631809 3066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:07.632242 kubelet[3066]: E1213 14:15:07.632210 3066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:07.632242 kubelet[3066]: W1213 14:15:07.632237 3066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:07.634548 kubelet[3066]: E1213 14:15:07.632284 3066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:07.634548 kubelet[3066]: E1213 14:15:07.632815 3066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:07.634548 kubelet[3066]: W1213 14:15:07.632840 3066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:07.634548 kubelet[3066]: E1213 14:15:07.632874 3066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:07.634548 kubelet[3066]: E1213 14:15:07.633508 3066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:07.634548 kubelet[3066]: W1213 14:15:07.633532 3066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:07.634548 kubelet[3066]: E1213 14:15:07.633568 3066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:07.634548 kubelet[3066]: E1213 14:15:07.634034 3066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:07.634548 kubelet[3066]: W1213 14:15:07.634086 3066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:07.634548 kubelet[3066]: E1213 14:15:07.634124 3066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:07.635181 kubelet[3066]: E1213 14:15:07.634827 3066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:07.635181 kubelet[3066]: W1213 14:15:07.634878 3066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:07.635181 kubelet[3066]: E1213 14:15:07.634914 3066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:07.635411 kubelet[3066]: E1213 14:15:07.635367 3066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:07.635537 kubelet[3066]: W1213 14:15:07.635455 3066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:07.635773 kubelet[3066]: E1213 14:15:07.635681 3066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:07.640815 kubelet[3066]: E1213 14:15:07.637741 3066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:07.640815 kubelet[3066]: W1213 14:15:07.637807 3066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:07.640815 kubelet[3066]: E1213 14:15:07.637886 3066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:07.640815 kubelet[3066]: E1213 14:15:07.638546 3066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:07.640815 kubelet[3066]: W1213 14:15:07.638610 3066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:07.640815 kubelet[3066]: E1213 14:15:07.638654 3066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:07.640815 kubelet[3066]: E1213 14:15:07.639303 3066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:07.640815 kubelet[3066]: W1213 14:15:07.639367 3066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:07.640815 kubelet[3066]: E1213 14:15:07.639434 3066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:07.640815 kubelet[3066]: E1213 14:15:07.639984 3066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:07.641517 kubelet[3066]: W1213 14:15:07.640010 3066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:07.641517 kubelet[3066]: E1213 14:15:07.640044 3066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:07.641517 kubelet[3066]: E1213 14:15:07.640476 3066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:07.641517 kubelet[3066]: W1213 14:15:07.640499 3066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:07.641517 kubelet[3066]: E1213 14:15:07.640545 3066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:07.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:07.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:07.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:07.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:07.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:07.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:07.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:07.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:07.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:07.671000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:07.671000 audit: BPF prog-id=128 op=LOAD Dec 13 14:15:07.679000 audit[3522]: AVC avc: denied { bpf } for pid=3522 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:07.679000 audit[3522]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=3510 pid=3522 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:07.679000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666623462333536376635626663663933663236383061323963666666 Dec 13 14:15:07.680000 audit[3522]: AVC avc: denied { perfmon } for pid=3522 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:07.680000 audit[3522]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=3510 pid=3522 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:07.680000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666623462333536376635626663663933663236383061323963666666 Dec 13 14:15:07.680000 audit[3522]: AVC avc: denied { bpf } for pid=3522 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:07.680000 audit[3522]: AVC avc: denied { bpf } for pid=3522 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:07.680000 audit[3522]: AVC avc: denied { bpf } for pid=3522 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:07.680000 audit[3522]: AVC avc: denied { perfmon } for pid=3522 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:07.680000 audit[3522]: AVC avc: denied { perfmon } for pid=3522 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:07.680000 audit[3522]: AVC avc: denied { perfmon } for pid=3522 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:07.680000 audit[3522]: AVC avc: denied { perfmon } for pid=3522 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:07.680000 audit[3522]: AVC avc: denied { perfmon } for pid=3522 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:07.680000 audit[3522]: AVC avc: denied { bpf } for pid=3522 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:07.680000 audit[3522]: AVC avc: denied { bpf } for pid=3522 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:07.680000 audit: BPF prog-id=129 op=LOAD Dec 13 14:15:07.680000 audit[3522]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=3510 pid=3522 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:07.680000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666623462333536376635626663663933663236383061323963666666 Dec 13 14:15:07.680000 audit[3522]: AVC avc: denied { bpf } for pid=3522 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:07.680000 audit[3522]: AVC avc: denied { bpf } for pid=3522 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:07.680000 audit[3522]: AVC avc: denied { perfmon } for pid=3522 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:07.680000 audit[3522]: AVC avc: denied { perfmon } for pid=3522 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:07.680000 audit[3522]: AVC avc: denied { perfmon } for pid=3522 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:07.680000 audit[3522]: AVC avc: denied { perfmon } for pid=3522 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:07.680000 audit[3522]: AVC avc: denied { perfmon } for pid=3522 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:07.680000 audit[3522]: AVC avc: denied { bpf } for pid=3522 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:07.680000 audit[3522]: AVC avc: denied { bpf } for pid=3522 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:07.680000 audit: BPF prog-id=130 op=LOAD Dec 13 14:15:07.680000 audit[3522]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=3510 pid=3522 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:07.680000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666623462333536376635626663663933663236383061323963666666 Dec 13 14:15:07.681000 audit: BPF prog-id=130 op=UNLOAD Dec 13 14:15:07.681000 audit: BPF prog-id=129 op=UNLOAD Dec 13 14:15:07.681000 audit[3522]: AVC avc: denied { bpf } for pid=3522 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:07.681000 audit[3522]: AVC avc: denied { bpf } for pid=3522 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:07.681000 audit[3522]: AVC avc: denied { bpf } for pid=3522 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:07.681000 audit[3522]: AVC avc: denied { perfmon } for pid=3522 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:07.681000 audit[3522]: AVC avc: denied { perfmon } for pid=3522 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:07.681000 audit[3522]: AVC avc: denied { perfmon } for pid=3522 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:07.681000 audit[3522]: AVC avc: denied { perfmon } for pid=3522 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:07.681000 audit[3522]: AVC avc: denied { perfmon } for pid=3522 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:07.681000 audit[3522]: AVC avc: denied { bpf } for pid=3522 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:07.681000 audit[3522]: AVC avc: denied { bpf } for pid=3522 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:07.681000 audit: BPF prog-id=131 op=LOAD Dec 13 14:15:07.681000 audit[3522]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=3510 pid=3522 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:07.681000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666623462333536376635626663663933663236383061323963666666 Dec 13 14:15:07.735037 kubelet[3066]: E1213 14:15:07.731800 3066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:07.735037 kubelet[3066]: W1213 14:15:07.731834 3066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:07.735819 kubelet[3066]: E1213 14:15:07.735363 3066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:07.736658 kubelet[3066]: E1213 14:15:07.736284 3066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:07.736658 kubelet[3066]: W1213 14:15:07.736314 3066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:07.736658 kubelet[3066]: E1213 14:15:07.736373 3066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:07.737405 kubelet[3066]: E1213 14:15:07.737097 3066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:07.737405 kubelet[3066]: W1213 14:15:07.737126 3066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:07.737405 kubelet[3066]: E1213 14:15:07.737183 3066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:07.738010 kubelet[3066]: E1213 14:15:07.737893 3066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:07.738010 kubelet[3066]: W1213 14:15:07.737942 3066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:07.738010 kubelet[3066]: E1213 14:15:07.737976 3066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:07.738997 kubelet[3066]: E1213 14:15:07.738966 3066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:07.739191 kubelet[3066]: W1213 14:15:07.739161 3066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:07.739356 kubelet[3066]: E1213 14:15:07.739333 3066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:07.743287 env[1818]: time="2024-12-13T14:15:07.743212562Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-sfn7p,Uid:2fa9a11d-d397-4cc4-ae12-8f21933bf29d,Namespace:calico-system,Attempt:0,} returns sandbox id \"ffb4b3567f5bfcf93f2680a29cfffd6d26d8cf1bc3d5e3c7714b1c74b6c57c6b\"" Dec 13 14:15:07.770125 kubelet[3066]: E1213 14:15:07.770076 3066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:07.770125 kubelet[3066]: W1213 14:15:07.770114 3066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:07.770544 kubelet[3066]: E1213 14:15:07.770152 3066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:07.901000 audit[3580]: NETFILTER_CFG table=filter:95 family=2 entries=18 op=nft_register_rule pid=3580 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:15:07.901000 audit[3580]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6652 a0=3 a1=ffffc84c1750 a2=0 a3=1 items=0 ppid=3199 pid=3580 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:07.901000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:15:07.906000 audit[3580]: NETFILTER_CFG table=nat:96 family=2 entries=12 op=nft_register_rule pid=3580 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:15:07.906000 audit[3580]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffc84c1750 a2=0 a3=1 items=0 ppid=3199 pid=3580 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:07.906000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:15:09.270741 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1191133427.mount: Deactivated successfully. Dec 13 14:15:09.399554 kubelet[3066]: E1213 14:15:09.399474 3066 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-r2mtx" podUID="598fbb62-2ff1-4c40-b8a5-720bd020a409" Dec 13 14:15:10.424819 env[1818]: time="2024-12-13T14:15:10.424735482Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:15:10.430277 env[1818]: time="2024-12-13T14:15:10.430206728Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1d1fc316829ae1650b0b1629b54232520f297e7c3b1444eecd290ae088902a28,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:15:10.434195 env[1818]: time="2024-12-13T14:15:10.434138421Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:15:10.438848 env[1818]: time="2024-12-13T14:15:10.438775995Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:768a194e1115c73bcbf35edb7afd18a63e16e08d940c79993565b6a3cca2da7c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:15:10.442234 env[1818]: time="2024-12-13T14:15:10.441085465Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.1\" returns image reference \"sha256:1d1fc316829ae1650b0b1629b54232520f297e7c3b1444eecd290ae088902a28\"" Dec 13 14:15:10.443241 env[1818]: time="2024-12-13T14:15:10.443176316Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\"" Dec 13 14:15:10.475734 env[1818]: time="2024-12-13T14:15:10.475672052Z" level=info msg="CreateContainer within sandbox \"93eb0d4c8667c663dbbdb1c84e61639095717a0cb5aa8cce94c8c09f9b64a563\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Dec 13 14:15:10.504988 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount274542218.mount: Deactivated successfully. Dec 13 14:15:10.511558 env[1818]: time="2024-12-13T14:15:10.511494998Z" level=info msg="CreateContainer within sandbox \"93eb0d4c8667c663dbbdb1c84e61639095717a0cb5aa8cce94c8c09f9b64a563\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"7faf67e394bf1d24c8c7676d88c00973bcfa71b901e78fa31540968292888599\"" Dec 13 14:15:10.514333 env[1818]: time="2024-12-13T14:15:10.513830687Z" level=info msg="StartContainer for \"7faf67e394bf1d24c8c7676d88c00973bcfa71b901e78fa31540968292888599\"" Dec 13 14:15:10.568686 systemd[1]: Started cri-containerd-7faf67e394bf1d24c8c7676d88c00973bcfa71b901e78fa31540968292888599.scope. Dec 13 14:15:10.617000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:10.617000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:10.617000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:10.617000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:10.617000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:10.617000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:10.617000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:10.617000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:10.617000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:10.618000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:10.618000 audit: BPF prog-id=132 op=LOAD Dec 13 14:15:10.619000 audit[3591]: AVC avc: denied { bpf } for pid=3591 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:10.619000 audit[3591]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=3431 pid=3591 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:10.619000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766616636376533393462663164323463386337363736643838633030 Dec 13 14:15:10.619000 audit[3591]: AVC avc: denied { perfmon } for pid=3591 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:10.619000 audit[3591]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=3431 pid=3591 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:10.619000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766616636376533393462663164323463386337363736643838633030 Dec 13 14:15:10.619000 audit[3591]: AVC avc: denied { bpf } for pid=3591 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:10.619000 audit[3591]: AVC avc: denied { bpf } for pid=3591 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:10.619000 audit[3591]: AVC avc: denied { bpf } for pid=3591 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:10.619000 audit[3591]: AVC avc: denied { perfmon } for pid=3591 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:10.619000 audit[3591]: AVC avc: denied { perfmon } for pid=3591 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:10.619000 audit[3591]: AVC avc: denied { perfmon } for pid=3591 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:10.619000 audit[3591]: AVC avc: denied { perfmon } for pid=3591 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:10.619000 audit[3591]: AVC avc: denied { perfmon } for pid=3591 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:10.619000 audit[3591]: AVC avc: denied { bpf } for pid=3591 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:10.619000 audit[3591]: AVC avc: denied { bpf } for pid=3591 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:10.619000 audit: BPF prog-id=133 op=LOAD Dec 13 14:15:10.619000 audit[3591]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=3431 pid=3591 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:10.619000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766616636376533393462663164323463386337363736643838633030 Dec 13 14:15:10.619000 audit[3591]: AVC avc: denied { bpf } for pid=3591 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:10.619000 audit[3591]: AVC avc: denied { bpf } for pid=3591 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:10.619000 audit[3591]: AVC avc: denied { perfmon } for pid=3591 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:10.619000 audit[3591]: AVC avc: denied { perfmon } for pid=3591 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:10.619000 audit[3591]: AVC avc: denied { perfmon } for pid=3591 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:10.619000 audit[3591]: AVC avc: denied { perfmon } for pid=3591 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:10.619000 audit[3591]: AVC avc: denied { perfmon } for pid=3591 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:10.619000 audit[3591]: AVC avc: denied { bpf } for pid=3591 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:10.619000 audit[3591]: AVC avc: denied { bpf } for pid=3591 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:10.619000 audit: BPF prog-id=134 op=LOAD Dec 13 14:15:10.619000 audit[3591]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=3431 pid=3591 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:10.619000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766616636376533393462663164323463386337363736643838633030 Dec 13 14:15:10.620000 audit: BPF prog-id=134 op=UNLOAD Dec 13 14:15:10.620000 audit: BPF prog-id=133 op=UNLOAD Dec 13 14:15:10.620000 audit[3591]: AVC avc: denied { bpf } for pid=3591 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:10.620000 audit[3591]: AVC avc: denied { bpf } for pid=3591 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:10.620000 audit[3591]: AVC avc: denied { bpf } for pid=3591 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:10.620000 audit[3591]: AVC avc: denied { perfmon } for pid=3591 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:10.620000 audit[3591]: AVC avc: denied { perfmon } for pid=3591 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:10.620000 audit[3591]: AVC avc: denied { perfmon } for pid=3591 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:10.620000 audit[3591]: AVC avc: denied { perfmon } for pid=3591 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:10.620000 audit[3591]: AVC avc: denied { perfmon } for pid=3591 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:10.620000 audit[3591]: AVC avc: denied { bpf } for pid=3591 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:10.620000 audit[3591]: AVC avc: denied { bpf } for pid=3591 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:10.620000 audit: BPF prog-id=135 op=LOAD Dec 13 14:15:10.620000 audit[3591]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=3431 pid=3591 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:10.620000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766616636376533393462663164323463386337363736643838633030 Dec 13 14:15:10.676328 env[1818]: time="2024-12-13T14:15:10.676143260Z" level=info msg="StartContainer for \"7faf67e394bf1d24c8c7676d88c00973bcfa71b901e78fa31540968292888599\" returns successfully" Dec 13 14:15:11.175902 amazon-ssm-agent[1834]: 2024-12-13 14:15:11 INFO [HealthCheck] HealthCheck reporting agent health. Dec 13 14:15:11.398605 kubelet[3066]: E1213 14:15:11.398527 3066 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-r2mtx" podUID="598fbb62-2ff1-4c40-b8a5-720bd020a409" Dec 13 14:15:11.580328 kubelet[3066]: I1213 14:15:11.580175 3066 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-typha-6854c48c8d-hnpcd" podStartSLOduration=2.734204851 podStartE2EDuration="5.580090242s" podCreationTimestamp="2024-12-13 14:15:06 +0000 UTC" firstStartedPulling="2024-12-13 14:15:07.596880113 +0000 UTC m=+25.439153566" lastFinishedPulling="2024-12-13 14:15:10.442765516 +0000 UTC m=+28.285038957" observedRunningTime="2024-12-13 14:15:11.575907904 +0000 UTC m=+29.418181357" watchObservedRunningTime="2024-12-13 14:15:11.580090242 +0000 UTC m=+29.422363731" Dec 13 14:15:11.647978 kubelet[3066]: E1213 14:15:11.647918 3066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:11.649031 kubelet[3066]: W1213 14:15:11.648974 3066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:11.649275 kubelet[3066]: E1213 14:15:11.649242 3066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:11.650096 kubelet[3066]: E1213 14:15:11.650053 3066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:11.650504 kubelet[3066]: W1213 14:15:11.650406 3066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:11.650729 kubelet[3066]: E1213 14:15:11.650699 3066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:11.651494 kubelet[3066]: E1213 14:15:11.651451 3066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:11.652455 kubelet[3066]: W1213 14:15:11.652367 3066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:11.652746 kubelet[3066]: E1213 14:15:11.652710 3066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:11.653553 kubelet[3066]: E1213 14:15:11.653512 3066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:11.653883 kubelet[3066]: W1213 14:15:11.653841 3066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:11.654119 kubelet[3066]: E1213 14:15:11.654091 3066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:11.655330 kubelet[3066]: E1213 14:15:11.655235 3066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:11.655615 kubelet[3066]: W1213 14:15:11.655581 3066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:11.655768 kubelet[3066]: E1213 14:15:11.655743 3066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:11.656720 kubelet[3066]: E1213 14:15:11.656677 3066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:11.657960 kubelet[3066]: W1213 14:15:11.656917 3066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:11.657960 kubelet[3066]: E1213 14:15:11.656967 3066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:11.657960 kubelet[3066]: E1213 14:15:11.657548 3066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:11.657960 kubelet[3066]: W1213 14:15:11.657578 3066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:11.657960 kubelet[3066]: E1213 14:15:11.657615 3066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:11.658656 kubelet[3066]: E1213 14:15:11.658616 3066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:11.659057 kubelet[3066]: W1213 14:15:11.659014 3066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:11.659259 kubelet[3066]: E1213 14:15:11.659228 3066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:11.660767 kubelet[3066]: E1213 14:15:11.660711 3066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:11.661044 kubelet[3066]: W1213 14:15:11.661008 3066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:11.661219 kubelet[3066]: E1213 14:15:11.661190 3066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:11.662086 kubelet[3066]: E1213 14:15:11.662047 3066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:11.663197 kubelet[3066]: W1213 14:15:11.662227 3066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:11.663197 kubelet[3066]: E1213 14:15:11.662270 3066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:11.663197 kubelet[3066]: E1213 14:15:11.662836 3066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:11.663197 kubelet[3066]: W1213 14:15:11.662865 3066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:11.663197 kubelet[3066]: E1213 14:15:11.662903 3066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:11.664614 kubelet[3066]: E1213 14:15:11.664572 3066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:11.664834 kubelet[3066]: W1213 14:15:11.664800 3066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:11.664975 kubelet[3066]: E1213 14:15:11.664951 3066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:11.665731 kubelet[3066]: E1213 14:15:11.665692 3066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:11.666719 kubelet[3066]: W1213 14:15:11.665874 3066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:11.666719 kubelet[3066]: E1213 14:15:11.665921 3066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:11.666719 kubelet[3066]: E1213 14:15:11.666473 3066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:11.666719 kubelet[3066]: W1213 14:15:11.666504 3066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:11.666719 kubelet[3066]: E1213 14:15:11.666539 3066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:11.668683 kubelet[3066]: E1213 14:15:11.668631 3066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:11.668683 kubelet[3066]: W1213 14:15:11.668675 3066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:11.668931 kubelet[3066]: E1213 14:15:11.668717 3066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:11.669604 kubelet[3066]: E1213 14:15:11.669370 3066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:11.669604 kubelet[3066]: W1213 14:15:11.669409 3066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:11.669604 kubelet[3066]: E1213 14:15:11.669469 3066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:11.670083 kubelet[3066]: E1213 14:15:11.670045 3066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:11.670083 kubelet[3066]: W1213 14:15:11.670083 3066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:11.670321 kubelet[3066]: E1213 14:15:11.670130 3066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:11.671148 kubelet[3066]: E1213 14:15:11.671074 3066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:11.671148 kubelet[3066]: W1213 14:15:11.671143 3066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:11.671403 kubelet[3066]: E1213 14:15:11.671219 3066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:11.671860 kubelet[3066]: E1213 14:15:11.671823 3066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:11.671860 kubelet[3066]: W1213 14:15:11.671858 3066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:11.672111 kubelet[3066]: E1213 14:15:11.672081 3066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:11.672243 kubelet[3066]: E1213 14:15:11.672205 3066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:11.672243 kubelet[3066]: W1213 14:15:11.672234 3066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:11.672515 kubelet[3066]: E1213 14:15:11.672487 3066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:11.672737 kubelet[3066]: E1213 14:15:11.672702 3066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:11.672824 kubelet[3066]: W1213 14:15:11.672742 3066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:11.672824 kubelet[3066]: E1213 14:15:11.672782 3066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:11.673228 kubelet[3066]: E1213 14:15:11.673194 3066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:11.673355 kubelet[3066]: W1213 14:15:11.673227 3066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:11.673355 kubelet[3066]: E1213 14:15:11.673274 3066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:11.673766 kubelet[3066]: E1213 14:15:11.673733 3066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:11.673877 kubelet[3066]: W1213 14:15:11.673766 3066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:11.673981 kubelet[3066]: E1213 14:15:11.673948 3066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:11.674233 kubelet[3066]: E1213 14:15:11.674204 3066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:11.674366 kubelet[3066]: W1213 14:15:11.674238 3066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:11.674553 kubelet[3066]: E1213 14:15:11.674524 3066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:11.674691 kubelet[3066]: E1213 14:15:11.674619 3066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:11.674848 kubelet[3066]: W1213 14:15:11.674820 3066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:11.675032 kubelet[3066]: E1213 14:15:11.674995 3066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:11.675572 kubelet[3066]: E1213 14:15:11.675543 3066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:11.675766 kubelet[3066]: W1213 14:15:11.675738 3066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:11.675972 kubelet[3066]: E1213 14:15:11.675891 3066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:11.676381 kubelet[3066]: E1213 14:15:11.676333 3066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:11.676381 kubelet[3066]: W1213 14:15:11.676369 3066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:11.676595 kubelet[3066]: E1213 14:15:11.676406 3066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:11.676881 kubelet[3066]: E1213 14:15:11.676851 3066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:11.677021 kubelet[3066]: W1213 14:15:11.676880 3066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:11.677021 kubelet[3066]: E1213 14:15:11.676921 3066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:11.678110 kubelet[3066]: E1213 14:15:11.678070 3066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:11.678295 kubelet[3066]: W1213 14:15:11.678104 3066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:11.678295 kubelet[3066]: E1213 14:15:11.678216 3066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:11.678672 kubelet[3066]: E1213 14:15:11.678640 3066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:11.678795 kubelet[3066]: W1213 14:15:11.678671 3066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:11.678795 kubelet[3066]: E1213 14:15:11.678711 3066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:11.679174 kubelet[3066]: E1213 14:15:11.679140 3066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:11.679174 kubelet[3066]: W1213 14:15:11.679172 3066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:11.679393 kubelet[3066]: E1213 14:15:11.679364 3066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:11.679679 kubelet[3066]: E1213 14:15:11.679628 3066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:11.679679 kubelet[3066]: W1213 14:15:11.679658 3066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:11.679859 kubelet[3066]: E1213 14:15:11.679689 3066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:11.680756 kubelet[3066]: E1213 14:15:11.680724 3066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:11.680939 kubelet[3066]: W1213 14:15:11.680911 3066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:11.681069 kubelet[3066]: E1213 14:15:11.681046 3066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:12.521881 env[1818]: time="2024-12-13T14:15:12.521798423Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:15:12.528014 env[1818]: time="2024-12-13T14:15:12.527932961Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ece9bca32e64e726de8bbfc9e175a3ca91e0881cd40352bfcd1d107411f4f348,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:15:12.532927 env[1818]: time="2024-12-13T14:15:12.532853905Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:15:12.536595 env[1818]: time="2024-12-13T14:15:12.536526585Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:a63f8b4ff531912d12d143664eb263fdbc6cd7b3ff4aa777dfb6e318a090462c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:15:12.537731 env[1818]: time="2024-12-13T14:15:12.537683372Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\" returns image reference \"sha256:ece9bca32e64e726de8bbfc9e175a3ca91e0881cd40352bfcd1d107411f4f348\"" Dec 13 14:15:12.542485 env[1818]: time="2024-12-13T14:15:12.542396677Z" level=info msg="CreateContainer within sandbox \"ffb4b3567f5bfcf93f2680a29cfffd6d26d8cf1bc3d5e3c7714b1c74b6c57c6b\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Dec 13 14:15:12.558822 kubelet[3066]: I1213 14:15:12.558764 3066 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 14:15:12.581055 kubelet[3066]: E1213 14:15:12.577800 3066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:12.582834 kubelet[3066]: W1213 14:15:12.581243 3066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:12.582834 kubelet[3066]: E1213 14:15:12.581334 3066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:12.581674 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount193312559.mount: Deactivated successfully. Dec 13 14:15:12.591049 kubelet[3066]: E1213 14:15:12.590406 3066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:12.591049 kubelet[3066]: W1213 14:15:12.590480 3066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:12.591049 kubelet[3066]: E1213 14:15:12.590520 3066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:12.591049 kubelet[3066]: E1213 14:15:12.590898 3066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:12.591049 kubelet[3066]: W1213 14:15:12.590921 3066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:12.591049 kubelet[3066]: E1213 14:15:12.590947 3066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:12.591718 kubelet[3066]: E1213 14:15:12.591231 3066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:12.591718 kubelet[3066]: W1213 14:15:12.591248 3066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:12.591718 kubelet[3066]: E1213 14:15:12.591272 3066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:12.591718 kubelet[3066]: E1213 14:15:12.591646 3066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:12.591718 kubelet[3066]: W1213 14:15:12.591664 3066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:12.591718 kubelet[3066]: E1213 14:15:12.591689 3066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:12.592082 kubelet[3066]: E1213 14:15:12.591967 3066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:12.592082 kubelet[3066]: W1213 14:15:12.591985 3066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:12.592082 kubelet[3066]: E1213 14:15:12.592011 3066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:12.592528 kubelet[3066]: E1213 14:15:12.592277 3066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:12.592528 kubelet[3066]: W1213 14:15:12.592305 3066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:12.592528 kubelet[3066]: E1213 14:15:12.592332 3066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:12.592731 kubelet[3066]: E1213 14:15:12.592702 3066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:12.592731 kubelet[3066]: W1213 14:15:12.592720 3066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:12.592888 kubelet[3066]: E1213 14:15:12.592744 3066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:12.593248 kubelet[3066]: E1213 14:15:12.593042 3066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:12.593248 kubelet[3066]: W1213 14:15:12.593069 3066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:12.593248 kubelet[3066]: E1213 14:15:12.593097 3066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:12.594713 kubelet[3066]: E1213 14:15:12.594539 3066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:12.594713 kubelet[3066]: W1213 14:15:12.594711 3066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:12.595080 kubelet[3066]: E1213 14:15:12.594750 3066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:12.596953 kubelet[3066]: E1213 14:15:12.596910 3066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:12.596953 kubelet[3066]: W1213 14:15:12.596948 3066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:12.597199 kubelet[3066]: E1213 14:15:12.596985 3066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:12.597404 kubelet[3066]: E1213 14:15:12.597376 3066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:12.597584 kubelet[3066]: W1213 14:15:12.597403 3066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:12.597584 kubelet[3066]: E1213 14:15:12.597448 3066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:12.598031 kubelet[3066]: E1213 14:15:12.597983 3066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:12.598031 kubelet[3066]: W1213 14:15:12.598019 3066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:12.598191 kubelet[3066]: E1213 14:15:12.598051 3066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:12.598498 kubelet[3066]: E1213 14:15:12.598461 3066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:12.598498 kubelet[3066]: W1213 14:15:12.598492 3066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:12.598684 kubelet[3066]: E1213 14:15:12.598521 3066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:12.598898 kubelet[3066]: E1213 14:15:12.598869 3066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:12.599075 kubelet[3066]: W1213 14:15:12.599020 3066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:12.599166 kubelet[3066]: E1213 14:15:12.599098 3066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:12.599778 kubelet[3066]: E1213 14:15:12.599745 3066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:12.599778 kubelet[3066]: W1213 14:15:12.599776 3066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:12.601023 kubelet[3066]: E1213 14:15:12.599809 3066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:12.601023 kubelet[3066]: E1213 14:15:12.600250 3066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:12.601023 kubelet[3066]: W1213 14:15:12.600269 3066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:12.601023 kubelet[3066]: E1213 14:15:12.600302 3066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:12.601023 kubelet[3066]: E1213 14:15:12.600745 3066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:12.601023 kubelet[3066]: W1213 14:15:12.600762 3066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:12.601023 kubelet[3066]: E1213 14:15:12.600794 3066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:12.601443 kubelet[3066]: E1213 14:15:12.601278 3066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:12.601443 kubelet[3066]: W1213 14:15:12.601299 3066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:12.601443 kubelet[3066]: E1213 14:15:12.601334 3066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:12.601934 env[1818]: time="2024-12-13T14:15:12.601865978Z" level=info msg="CreateContainer within sandbox \"ffb4b3567f5bfcf93f2680a29cfffd6d26d8cf1bc3d5e3c7714b1c74b6c57c6b\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"398fbe572b861603acca0d02adf5482b341c6028766ec07750bb11e79cd7e491\"" Dec 13 14:15:12.602665 kubelet[3066]: E1213 14:15:12.602625 3066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:12.602665 kubelet[3066]: W1213 14:15:12.602662 3066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:12.604184 kubelet[3066]: E1213 14:15:12.604129 3066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:12.604337 env[1818]: time="2024-12-13T14:15:12.604222991Z" level=info msg="StartContainer for \"398fbe572b861603acca0d02adf5482b341c6028766ec07750bb11e79cd7e491\"" Dec 13 14:15:12.611566 kubelet[3066]: E1213 14:15:12.611517 3066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:12.611566 kubelet[3066]: W1213 14:15:12.611559 3066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:12.611970 kubelet[3066]: E1213 14:15:12.611933 3066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:12.612628 kubelet[3066]: E1213 14:15:12.612589 3066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:12.612905 kubelet[3066]: W1213 14:15:12.612867 3066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:12.613283 kubelet[3066]: E1213 14:15:12.613247 3066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:12.613852 kubelet[3066]: E1213 14:15:12.613811 3066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:12.614075 kubelet[3066]: W1213 14:15:12.614038 3066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:12.614502 kubelet[3066]: E1213 14:15:12.614469 3066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:12.614878 kubelet[3066]: E1213 14:15:12.614852 3066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:12.615057 kubelet[3066]: W1213 14:15:12.615023 3066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:12.615509 kubelet[3066]: E1213 14:15:12.615462 3066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:12.616173 kubelet[3066]: E1213 14:15:12.616137 3066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:12.616466 kubelet[3066]: W1213 14:15:12.616401 3066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:12.617029 kubelet[3066]: E1213 14:15:12.616992 3066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:12.618086 kubelet[3066]: E1213 14:15:12.618046 3066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:12.618502 kubelet[3066]: W1213 14:15:12.618462 3066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:12.618797 kubelet[3066]: E1213 14:15:12.618754 3066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:12.630011 kubelet[3066]: E1213 14:15:12.622769 3066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:12.630011 kubelet[3066]: W1213 14:15:12.622815 3066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:12.631185 kubelet[3066]: E1213 14:15:12.631146 3066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:12.632202 kubelet[3066]: E1213 14:15:12.632158 3066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:12.632202 kubelet[3066]: W1213 14:15:12.632196 3066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:12.632547 kubelet[3066]: E1213 14:15:12.632520 3066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:12.633602 kubelet[3066]: E1213 14:15:12.633543 3066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:12.633602 kubelet[3066]: W1213 14:15:12.633595 3066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:12.633905 kubelet[3066]: E1213 14:15:12.633859 3066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:12.634365 kubelet[3066]: E1213 14:15:12.634304 3066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:12.634365 kubelet[3066]: W1213 14:15:12.634350 3066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:12.634638 kubelet[3066]: E1213 14:15:12.634604 3066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:12.637182 kubelet[3066]: E1213 14:15:12.637120 3066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:12.637182 kubelet[3066]: W1213 14:15:12.637165 3066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:12.637540 kubelet[3066]: E1213 14:15:12.637222 3066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:12.641631 kubelet[3066]: E1213 14:15:12.641573 3066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:12.641631 kubelet[3066]: W1213 14:15:12.641616 3066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:12.642083 kubelet[3066]: E1213 14:15:12.642037 3066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:12.642583 kubelet[3066]: E1213 14:15:12.642537 3066 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:15:12.642583 kubelet[3066]: W1213 14:15:12.642574 3066 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:15:12.642792 kubelet[3066]: E1213 14:15:12.642610 3066 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:15:12.662786 systemd[1]: Started cri-containerd-398fbe572b861603acca0d02adf5482b341c6028766ec07750bb11e79cd7e491.scope. Dec 13 14:15:12.683952 systemd[1]: run-containerd-runc-k8s.io-398fbe572b861603acca0d02adf5482b341c6028766ec07750bb11e79cd7e491-runc.7pYmfW.mount: Deactivated successfully. Dec 13 14:15:12.731666 kernel: kauditd_printk_skb: 173 callbacks suppressed Dec 13 14:15:12.731806 kernel: audit: type=1400 audit(1734099312.721:997): avc: denied { perfmon } for pid=3695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:12.721000 audit[3695]: AVC avc: denied { perfmon } for pid=3695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:12.721000 audit[3695]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001c55a0 a2=3c a3=0 items=0 ppid=3510 pid=3695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:12.743454 kernel: audit: type=1300 audit(1734099312.721:997): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001c55a0 a2=3c a3=0 items=0 ppid=3510 pid=3695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:12.721000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339386662653537326238363136303361636361306430326164663534 Dec 13 14:15:12.753496 kernel: audit: type=1327 audit(1734099312.721:997): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339386662653537326238363136303361636361306430326164663534 Dec 13 14:15:12.721000 audit[3695]: AVC avc: denied { bpf } for pid=3695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:12.721000 audit[3695]: AVC avc: denied { bpf } for pid=3695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:12.767956 kernel: audit: type=1400 audit(1734099312.721:998): avc: denied { bpf } for pid=3695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:12.768064 kernel: audit: type=1400 audit(1734099312.721:998): avc: denied { bpf } for pid=3695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:12.721000 audit[3695]: AVC avc: denied { bpf } for pid=3695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:12.775258 kernel: audit: type=1400 audit(1734099312.721:998): avc: denied { bpf } for pid=3695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:12.721000 audit[3695]: AVC avc: denied { perfmon } for pid=3695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:12.796276 kernel: audit: type=1400 audit(1734099312.721:998): avc: denied { perfmon } for pid=3695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:12.721000 audit[3695]: AVC avc: denied { perfmon } for pid=3695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:12.807294 kernel: audit: type=1400 audit(1734099312.721:998): avc: denied { perfmon } for pid=3695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:12.721000 audit[3695]: AVC avc: denied { perfmon } for pid=3695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:12.819495 kernel: audit: type=1400 audit(1734099312.721:998): avc: denied { perfmon } for pid=3695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:12.721000 audit[3695]: AVC avc: denied { perfmon } for pid=3695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:12.829507 kernel: audit: type=1400 audit(1734099312.721:998): avc: denied { perfmon } for pid=3695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:12.721000 audit[3695]: AVC avc: denied { perfmon } for pid=3695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:12.721000 audit[3695]: AVC avc: denied { bpf } for pid=3695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:12.721000 audit[3695]: AVC avc: denied { bpf } for pid=3695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:12.721000 audit: BPF prog-id=136 op=LOAD Dec 13 14:15:12.721000 audit[3695]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001c58e0 a2=78 a3=0 items=0 ppid=3510 pid=3695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:12.721000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339386662653537326238363136303361636361306430326164663534 Dec 13 14:15:12.724000 audit[3695]: AVC avc: denied { bpf } for pid=3695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:12.724000 audit[3695]: AVC avc: denied { bpf } for pid=3695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:12.724000 audit[3695]: AVC avc: denied { perfmon } for pid=3695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:12.724000 audit[3695]: AVC avc: denied { perfmon } for pid=3695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:12.724000 audit[3695]: AVC avc: denied { perfmon } for pid=3695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:12.724000 audit[3695]: AVC avc: denied { perfmon } for pid=3695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:12.724000 audit[3695]: AVC avc: denied { perfmon } for pid=3695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:12.724000 audit[3695]: AVC avc: denied { bpf } for pid=3695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:12.724000 audit[3695]: AVC avc: denied { bpf } for pid=3695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:12.724000 audit: BPF prog-id=137 op=LOAD Dec 13 14:15:12.724000 audit[3695]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001c5670 a2=78 a3=0 items=0 ppid=3510 pid=3695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:12.724000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339386662653537326238363136303361636361306430326164663534 Dec 13 14:15:12.731000 audit: BPF prog-id=137 op=UNLOAD Dec 13 14:15:12.731000 audit: BPF prog-id=136 op=UNLOAD Dec 13 14:15:12.731000 audit[3695]: AVC avc: denied { bpf } for pid=3695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:12.731000 audit[3695]: AVC avc: denied { bpf } for pid=3695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:12.731000 audit[3695]: AVC avc: denied { bpf } for pid=3695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:12.731000 audit[3695]: AVC avc: denied { perfmon } for pid=3695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:12.731000 audit[3695]: AVC avc: denied { perfmon } for pid=3695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:12.731000 audit[3695]: AVC avc: denied { perfmon } for pid=3695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:12.731000 audit[3695]: AVC avc: denied { perfmon } for pid=3695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:12.731000 audit[3695]: AVC avc: denied { perfmon } for pid=3695 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:12.731000 audit[3695]: AVC avc: denied { bpf } for pid=3695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:12.731000 audit[3695]: AVC avc: denied { bpf } for pid=3695 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:12.731000 audit: BPF prog-id=138 op=LOAD Dec 13 14:15:12.731000 audit[3695]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001c5b40 a2=78 a3=0 items=0 ppid=3510 pid=3695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:12.731000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339386662653537326238363136303361636361306430326164663534 Dec 13 14:15:12.871285 env[1818]: time="2024-12-13T14:15:12.871194365Z" level=info msg="StartContainer for \"398fbe572b861603acca0d02adf5482b341c6028766ec07750bb11e79cd7e491\" returns successfully" Dec 13 14:15:12.903763 systemd[1]: cri-containerd-398fbe572b861603acca0d02adf5482b341c6028766ec07750bb11e79cd7e491.scope: Deactivated successfully. Dec 13 14:15:12.906000 audit: BPF prog-id=138 op=UNLOAD Dec 13 14:15:13.167726 env[1818]: time="2024-12-13T14:15:13.167656085Z" level=info msg="shim disconnected" id=398fbe572b861603acca0d02adf5482b341c6028766ec07750bb11e79cd7e491 Dec 13 14:15:13.168127 env[1818]: time="2024-12-13T14:15:13.168080840Z" level=warning msg="cleaning up after shim disconnected" id=398fbe572b861603acca0d02adf5482b341c6028766ec07750bb11e79cd7e491 namespace=k8s.io Dec 13 14:15:13.168313 env[1818]: time="2024-12-13T14:15:13.168281182Z" level=info msg="cleaning up dead shim" Dec 13 14:15:13.185803 env[1818]: time="2024-12-13T14:15:13.185738898Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:15:13Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3741 runtime=io.containerd.runc.v2\n" Dec 13 14:15:13.398681 kubelet[3066]: E1213 14:15:13.398035 3066 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-r2mtx" podUID="598fbb62-2ff1-4c40-b8a5-720bd020a409" Dec 13 14:15:13.566233 env[1818]: time="2024-12-13T14:15:13.566025613Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\"" Dec 13 14:15:13.573625 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-398fbe572b861603acca0d02adf5482b341c6028766ec07750bb11e79cd7e491-rootfs.mount: Deactivated successfully. Dec 13 14:15:15.398682 kubelet[3066]: E1213 14:15:15.398637 3066 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-r2mtx" podUID="598fbb62-2ff1-4c40-b8a5-720bd020a409" Dec 13 14:15:17.398973 kubelet[3066]: E1213 14:15:17.398903 3066 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-r2mtx" podUID="598fbb62-2ff1-4c40-b8a5-720bd020a409" Dec 13 14:15:19.271221 env[1818]: time="2024-12-13T14:15:19.271163062Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:15:19.275112 env[1818]: time="2024-12-13T14:15:19.275041565Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e5ca62af4ff61b88f55fe4e0d7723151103d3f6a470fd4ebb311a2de27a9597f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:15:19.279005 env[1818]: time="2024-12-13T14:15:19.278950476Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:15:19.282563 env[1818]: time="2024-12-13T14:15:19.282497261Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:21e759d51c90dfb34fc1397dc180dd3a3fb564c2b0580d2f61ffe108f2a3c94b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:15:19.284090 env[1818]: time="2024-12-13T14:15:19.284026157Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\" returns image reference \"sha256:e5ca62af4ff61b88f55fe4e0d7723151103d3f6a470fd4ebb311a2de27a9597f\"" Dec 13 14:15:19.289507 env[1818]: time="2024-12-13T14:15:19.289406808Z" level=info msg="CreateContainer within sandbox \"ffb4b3567f5bfcf93f2680a29cfffd6d26d8cf1bc3d5e3c7714b1c74b6c57c6b\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Dec 13 14:15:19.312230 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1642091869.mount: Deactivated successfully. Dec 13 14:15:19.318971 env[1818]: time="2024-12-13T14:15:19.318753426Z" level=info msg="CreateContainer within sandbox \"ffb4b3567f5bfcf93f2680a29cfffd6d26d8cf1bc3d5e3c7714b1c74b6c57c6b\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"78e6f4dc08dc07e31f18d289200ff92c59cc11b6e5afa1d3e3dceb961a747f07\"" Dec 13 14:15:19.321386 env[1818]: time="2024-12-13T14:15:19.321289934Z" level=info msg="StartContainer for \"78e6f4dc08dc07e31f18d289200ff92c59cc11b6e5afa1d3e3dceb961a747f07\"" Dec 13 14:15:19.363209 systemd[1]: Started cri-containerd-78e6f4dc08dc07e31f18d289200ff92c59cc11b6e5afa1d3e3dceb961a747f07.scope. Dec 13 14:15:19.398681 kubelet[3066]: E1213 14:15:19.398185 3066 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-r2mtx" podUID="598fbb62-2ff1-4c40-b8a5-720bd020a409" Dec 13 14:15:19.418000 audit[3768]: AVC avc: denied { perfmon } for pid=3768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:19.422371 kernel: kauditd_printk_skb: 34 callbacks suppressed Dec 13 14:15:19.422502 kernel: audit: type=1400 audit(1734099319.418:1004): avc: denied { perfmon } for pid=3768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:19.418000 audit[3768]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3510 pid=3768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:19.440350 kernel: audit: type=1300 audit(1734099319.418:1004): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3510 pid=3768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:19.418000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738653666346463303864633037653331663138643238393230306666 Dec 13 14:15:19.450403 kernel: audit: type=1327 audit(1734099319.418:1004): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738653666346463303864633037653331663138643238393230306666 Dec 13 14:15:19.419000 audit[3768]: AVC avc: denied { bpf } for pid=3768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:19.457848 kernel: audit: type=1400 audit(1734099319.419:1005): avc: denied { bpf } for pid=3768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:19.457940 kernel: audit: type=1400 audit(1734099319.419:1005): avc: denied { bpf } for pid=3768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:19.419000 audit[3768]: AVC avc: denied { bpf } for pid=3768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:19.419000 audit[3768]: AVC avc: denied { bpf } for pid=3768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:19.474487 kernel: audit: type=1400 audit(1734099319.419:1005): avc: denied { bpf } for pid=3768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:19.419000 audit[3768]: AVC avc: denied { perfmon } for pid=3768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:19.475525 kernel: audit: type=1400 audit(1734099319.419:1005): avc: denied { perfmon } for pid=3768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:19.419000 audit[3768]: AVC avc: denied { perfmon } for pid=3768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:19.494408 kernel: audit: type=1400 audit(1734099319.419:1005): avc: denied { perfmon } for pid=3768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:19.494576 kernel: audit: type=1400 audit(1734099319.419:1005): avc: denied { perfmon } for pid=3768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:19.419000 audit[3768]: AVC avc: denied { perfmon } for pid=3768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:19.419000 audit[3768]: AVC avc: denied { perfmon } for pid=3768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:19.509149 kernel: audit: type=1400 audit(1734099319.419:1005): avc: denied { perfmon } for pid=3768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:19.419000 audit[3768]: AVC avc: denied { perfmon } for pid=3768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:19.419000 audit[3768]: AVC avc: denied { bpf } for pid=3768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:19.419000 audit[3768]: AVC avc: denied { bpf } for pid=3768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:19.419000 audit: BPF prog-id=139 op=LOAD Dec 13 14:15:19.419000 audit[3768]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3510 pid=3768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:19.419000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738653666346463303864633037653331663138643238393230306666 Dec 13 14:15:19.421000 audit[3768]: AVC avc: denied { bpf } for pid=3768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:19.421000 audit[3768]: AVC avc: denied { bpf } for pid=3768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:19.421000 audit[3768]: AVC avc: denied { perfmon } for pid=3768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:19.421000 audit[3768]: AVC avc: denied { perfmon } for pid=3768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:19.421000 audit[3768]: AVC avc: denied { perfmon } for pid=3768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:19.421000 audit[3768]: AVC avc: denied { perfmon } for pid=3768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:19.421000 audit[3768]: AVC avc: denied { perfmon } for pid=3768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:19.421000 audit[3768]: AVC avc: denied { bpf } for pid=3768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:19.421000 audit[3768]: AVC avc: denied { bpf } for pid=3768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:19.421000 audit: BPF prog-id=140 op=LOAD Dec 13 14:15:19.421000 audit[3768]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3510 pid=3768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:19.421000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738653666346463303864633037653331663138643238393230306666 Dec 13 14:15:19.431000 audit: BPF prog-id=140 op=UNLOAD Dec 13 14:15:19.431000 audit: BPF prog-id=139 op=UNLOAD Dec 13 14:15:19.431000 audit[3768]: AVC avc: denied { bpf } for pid=3768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:19.431000 audit[3768]: AVC avc: denied { bpf } for pid=3768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:19.431000 audit[3768]: AVC avc: denied { bpf } for pid=3768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:19.431000 audit[3768]: AVC avc: denied { perfmon } for pid=3768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:19.431000 audit[3768]: AVC avc: denied { perfmon } for pid=3768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:19.431000 audit[3768]: AVC avc: denied { perfmon } for pid=3768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:19.431000 audit[3768]: AVC avc: denied { perfmon } for pid=3768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:19.431000 audit[3768]: AVC avc: denied { perfmon } for pid=3768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:19.431000 audit[3768]: AVC avc: denied { bpf } for pid=3768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:19.431000 audit[3768]: AVC avc: denied { bpf } for pid=3768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:19.431000 audit: BPF prog-id=141 op=LOAD Dec 13 14:15:19.431000 audit[3768]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3510 pid=3768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:19.431000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738653666346463303864633037653331663138643238393230306666 Dec 13 14:15:19.516625 env[1818]: time="2024-12-13T14:15:19.516549217Z" level=info msg="StartContainer for \"78e6f4dc08dc07e31f18d289200ff92c59cc11b6e5afa1d3e3dceb961a747f07\" returns successfully" Dec 13 14:15:20.524009 env[1818]: time="2024-12-13T14:15:20.523819783Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 14:15:20.529957 systemd[1]: cri-containerd-78e6f4dc08dc07e31f18d289200ff92c59cc11b6e5afa1d3e3dceb961a747f07.scope: Deactivated successfully. Dec 13 14:15:20.534000 audit: BPF prog-id=141 op=UNLOAD Dec 13 14:15:20.573137 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-78e6f4dc08dc07e31f18d289200ff92c59cc11b6e5afa1d3e3dceb961a747f07-rootfs.mount: Deactivated successfully. Dec 13 14:15:20.574980 kubelet[3066]: I1213 14:15:20.574406 3066 kubelet_node_status.go:497] "Fast updating node status as it just became ready" Dec 13 14:15:20.636128 kubelet[3066]: I1213 14:15:20.636074 3066 topology_manager.go:215] "Topology Admit Handler" podUID="ba6ec834-0540-4939-8d56-4186c0a4284f" podNamespace="kube-system" podName="coredns-76f75df574-5kblv" Dec 13 14:15:20.660370 systemd[1]: Created slice kubepods-burstable-podba6ec834_0540_4939_8d56_4186c0a4284f.slice. Dec 13 14:15:20.673719 kubelet[3066]: I1213 14:15:20.673669 3066 topology_manager.go:215] "Topology Admit Handler" podUID="8da61845-6202-427b-9fcf-1b4b4a040aed" podNamespace="calico-apiserver" podName="calico-apiserver-8878db5b5-czf6j" Dec 13 14:15:20.675971 kubelet[3066]: I1213 14:15:20.675890 3066 topology_manager.go:215] "Topology Admit Handler" podUID="55f96ceb-5c45-4365-b359-551ac19183ea" podNamespace="calico-system" podName="calico-kube-controllers-747dd4679c-kfxmw" Dec 13 14:15:20.677142 kubelet[3066]: I1213 14:15:20.677096 3066 topology_manager.go:215] "Topology Admit Handler" podUID="07b86ac8-84b4-4807-aaee-92f8a5bbaa89" podNamespace="kube-system" podName="coredns-76f75df574-hzf8c" Dec 13 14:15:20.689025 kubelet[3066]: I1213 14:15:20.688898 3066 topology_manager.go:215] "Topology Admit Handler" podUID="aa265595-980c-417f-a569-c324ec426ee4" podNamespace="calico-apiserver" podName="calico-apiserver-8878db5b5-qh9tk" Dec 13 14:15:20.696635 systemd[1]: Created slice kubepods-besteffort-pod8da61845_6202_427b_9fcf_1b4b4a040aed.slice. Dec 13 14:15:20.728881 systemd[1]: Created slice kubepods-besteffort-pod55f96ceb_5c45_4365_b359_551ac19183ea.slice. Dec 13 14:15:20.743503 systemd[1]: Created slice kubepods-burstable-pod07b86ac8_84b4_4807_aaee_92f8a5bbaa89.slice. Dec 13 14:15:20.756560 kubelet[3066]: I1213 14:15:20.756502 3066 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/ba6ec834-0540-4939-8d56-4186c0a4284f-config-volume\") pod \"coredns-76f75df574-5kblv\" (UID: \"ba6ec834-0540-4939-8d56-4186c0a4284f\") " pod="kube-system/coredns-76f75df574-5kblv" Dec 13 14:15:20.756905 kubelet[3066]: I1213 14:15:20.756879 3066 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-2dkvn\" (UniqueName: \"kubernetes.io/projected/ba6ec834-0540-4939-8d56-4186c0a4284f-kube-api-access-2dkvn\") pod \"coredns-76f75df574-5kblv\" (UID: \"ba6ec834-0540-4939-8d56-4186c0a4284f\") " pod="kube-system/coredns-76f75df574-5kblv" Dec 13 14:15:20.757311 systemd[1]: Created slice kubepods-besteffort-podaa265595_980c_417f_a569_c324ec426ee4.slice. Dec 13 14:15:20.858284 kubelet[3066]: I1213 14:15:20.858139 3066 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/07b86ac8-84b4-4807-aaee-92f8a5bbaa89-config-volume\") pod \"coredns-76f75df574-hzf8c\" (UID: \"07b86ac8-84b4-4807-aaee-92f8a5bbaa89\") " pod="kube-system/coredns-76f75df574-hzf8c" Dec 13 14:15:20.858715 kubelet[3066]: I1213 14:15:20.858685 3066 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-47jqm\" (UniqueName: \"kubernetes.io/projected/8da61845-6202-427b-9fcf-1b4b4a040aed-kube-api-access-47jqm\") pod \"calico-apiserver-8878db5b5-czf6j\" (UID: \"8da61845-6202-427b-9fcf-1b4b4a040aed\") " pod="calico-apiserver/calico-apiserver-8878db5b5-czf6j" Dec 13 14:15:20.859031 kubelet[3066]: I1213 14:15:20.858995 3066 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/aa265595-980c-417f-a569-c324ec426ee4-calico-apiserver-certs\") pod \"calico-apiserver-8878db5b5-qh9tk\" (UID: \"aa265595-980c-417f-a569-c324ec426ee4\") " pod="calico-apiserver/calico-apiserver-8878db5b5-qh9tk" Dec 13 14:15:20.860127 kubelet[3066]: I1213 14:15:20.860077 3066 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/8da61845-6202-427b-9fcf-1b4b4a040aed-calico-apiserver-certs\") pod \"calico-apiserver-8878db5b5-czf6j\" (UID: \"8da61845-6202-427b-9fcf-1b4b4a040aed\") " pod="calico-apiserver/calico-apiserver-8878db5b5-czf6j" Dec 13 14:15:20.860373 kubelet[3066]: I1213 14:15:20.860334 3066 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-bjkwk\" (UniqueName: \"kubernetes.io/projected/55f96ceb-5c45-4365-b359-551ac19183ea-kube-api-access-bjkwk\") pod \"calico-kube-controllers-747dd4679c-kfxmw\" (UID: \"55f96ceb-5c45-4365-b359-551ac19183ea\") " pod="calico-system/calico-kube-controllers-747dd4679c-kfxmw" Dec 13 14:15:20.860710 kubelet[3066]: I1213 14:15:20.860677 3066 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-82rhl\" (UniqueName: \"kubernetes.io/projected/aa265595-980c-417f-a569-c324ec426ee4-kube-api-access-82rhl\") pod \"calico-apiserver-8878db5b5-qh9tk\" (UID: \"aa265595-980c-417f-a569-c324ec426ee4\") " pod="calico-apiserver/calico-apiserver-8878db5b5-qh9tk" Dec 13 14:15:20.860829 kubelet[3066]: I1213 14:15:20.860748 3066 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/55f96ceb-5c45-4365-b359-551ac19183ea-tigera-ca-bundle\") pod \"calico-kube-controllers-747dd4679c-kfxmw\" (UID: \"55f96ceb-5c45-4365-b359-551ac19183ea\") " pod="calico-system/calico-kube-controllers-747dd4679c-kfxmw" Dec 13 14:15:20.860829 kubelet[3066]: I1213 14:15:20.860801 3066 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-rhl9s\" (UniqueName: \"kubernetes.io/projected/07b86ac8-84b4-4807-aaee-92f8a5bbaa89-kube-api-access-rhl9s\") pod \"coredns-76f75df574-hzf8c\" (UID: \"07b86ac8-84b4-4807-aaee-92f8a5bbaa89\") " pod="kube-system/coredns-76f75df574-hzf8c" Dec 13 14:15:20.974271 env[1818]: time="2024-12-13T14:15:20.973763115Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-5kblv,Uid:ba6ec834-0540-4939-8d56-4186c0a4284f,Namespace:kube-system,Attempt:0,}" Dec 13 14:15:21.041812 env[1818]: time="2024-12-13T14:15:21.041478770Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-747dd4679c-kfxmw,Uid:55f96ceb-5c45-4365-b359-551ac19183ea,Namespace:calico-system,Attempt:0,}" Dec 13 14:15:21.053899 env[1818]: time="2024-12-13T14:15:21.053743417Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-hzf8c,Uid:07b86ac8-84b4-4807-aaee-92f8a5bbaa89,Namespace:kube-system,Attempt:0,}" Dec 13 14:15:21.067271 env[1818]: time="2024-12-13T14:15:21.067182442Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-8878db5b5-qh9tk,Uid:aa265595-980c-417f-a569-c324ec426ee4,Namespace:calico-apiserver,Attempt:0,}" Dec 13 14:15:21.314890 env[1818]: time="2024-12-13T14:15:21.314536218Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-8878db5b5-czf6j,Uid:8da61845-6202-427b-9fcf-1b4b4a040aed,Namespace:calico-apiserver,Attempt:0,}" Dec 13 14:15:21.410867 systemd[1]: Created slice kubepods-besteffort-pod598fbb62_2ff1_4c40_b8a5_720bd020a409.slice. Dec 13 14:15:21.414993 env[1818]: time="2024-12-13T14:15:21.414850436Z" level=info msg="shim disconnected" id=78e6f4dc08dc07e31f18d289200ff92c59cc11b6e5afa1d3e3dceb961a747f07 Dec 13 14:15:21.415453 env[1818]: time="2024-12-13T14:15:21.415382712Z" level=warning msg="cleaning up after shim disconnected" id=78e6f4dc08dc07e31f18d289200ff92c59cc11b6e5afa1d3e3dceb961a747f07 namespace=k8s.io Dec 13 14:15:21.415586 env[1818]: time="2024-12-13T14:15:21.415468548Z" level=info msg="cleaning up dead shim" Dec 13 14:15:21.424211 env[1818]: time="2024-12-13T14:15:21.424139024Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-r2mtx,Uid:598fbb62-2ff1-4c40-b8a5-720bd020a409,Namespace:calico-system,Attempt:0,}" Dec 13 14:15:21.441301 env[1818]: time="2024-12-13T14:15:21.441232737Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:15:21Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3815 runtime=io.containerd.runc.v2\n" Dec 13 14:15:21.618621 env[1818]: time="2024-12-13T14:15:21.616565468Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\"" Dec 13 14:15:21.893998 env[1818]: time="2024-12-13T14:15:21.893730200Z" level=error msg="Failed to destroy network for sandbox \"429c2476fb25426d228c324ac7a91243ab78ad777b796c38b9f5ab890adce0da\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:15:21.903073 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-429c2476fb25426d228c324ac7a91243ab78ad777b796c38b9f5ab890adce0da-shm.mount: Deactivated successfully. Dec 13 14:15:21.905662 env[1818]: time="2024-12-13T14:15:21.905573536Z" level=error msg="encountered an error cleaning up failed sandbox \"429c2476fb25426d228c324ac7a91243ab78ad777b796c38b9f5ab890adce0da\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:15:21.905986 env[1818]: time="2024-12-13T14:15:21.905915539Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-8878db5b5-qh9tk,Uid:aa265595-980c-417f-a569-c324ec426ee4,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"429c2476fb25426d228c324ac7a91243ab78ad777b796c38b9f5ab890adce0da\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:15:21.906813 kubelet[3066]: E1213 14:15:21.906768 3066 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"429c2476fb25426d228c324ac7a91243ab78ad777b796c38b9f5ab890adce0da\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:15:21.907366 kubelet[3066]: E1213 14:15:21.906872 3066 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"429c2476fb25426d228c324ac7a91243ab78ad777b796c38b9f5ab890adce0da\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-8878db5b5-qh9tk" Dec 13 14:15:21.907366 kubelet[3066]: E1213 14:15:21.906938 3066 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"429c2476fb25426d228c324ac7a91243ab78ad777b796c38b9f5ab890adce0da\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-8878db5b5-qh9tk" Dec 13 14:15:21.907366 kubelet[3066]: E1213 14:15:21.907120 3066 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-8878db5b5-qh9tk_calico-apiserver(aa265595-980c-417f-a569-c324ec426ee4)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-8878db5b5-qh9tk_calico-apiserver(aa265595-980c-417f-a569-c324ec426ee4)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"429c2476fb25426d228c324ac7a91243ab78ad777b796c38b9f5ab890adce0da\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-8878db5b5-qh9tk" podUID="aa265595-980c-417f-a569-c324ec426ee4" Dec 13 14:15:21.937692 env[1818]: time="2024-12-13T14:15:21.937602650Z" level=error msg="Failed to destroy network for sandbox \"4efd2f0a680ad6d670ab93646b15d79ac1cbbc75b8e87abe3d3d6dcab3115dfa\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:15:21.946225 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-4efd2f0a680ad6d670ab93646b15d79ac1cbbc75b8e87abe3d3d6dcab3115dfa-shm.mount: Deactivated successfully. Dec 13 14:15:21.948444 env[1818]: time="2024-12-13T14:15:21.948352777Z" level=error msg="Failed to destroy network for sandbox \"fd62489a291fe65369fc57679c6a79016dcb022de2a65ff0cb240039c436bada\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:15:21.948931 env[1818]: time="2024-12-13T14:15:21.948557655Z" level=error msg="encountered an error cleaning up failed sandbox \"4efd2f0a680ad6d670ab93646b15d79ac1cbbc75b8e87abe3d3d6dcab3115dfa\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:15:21.950695 env[1818]: time="2024-12-13T14:15:21.950612431Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-hzf8c,Uid:07b86ac8-84b4-4807-aaee-92f8a5bbaa89,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"4efd2f0a680ad6d670ab93646b15d79ac1cbbc75b8e87abe3d3d6dcab3115dfa\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:15:21.955733 kubelet[3066]: E1213 14:15:21.951183 3066 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"4efd2f0a680ad6d670ab93646b15d79ac1cbbc75b8e87abe3d3d6dcab3115dfa\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:15:21.955733 kubelet[3066]: E1213 14:15:21.951318 3066 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"4efd2f0a680ad6d670ab93646b15d79ac1cbbc75b8e87abe3d3d6dcab3115dfa\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-76f75df574-hzf8c" Dec 13 14:15:21.955733 kubelet[3066]: E1213 14:15:21.951361 3066 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"4efd2f0a680ad6d670ab93646b15d79ac1cbbc75b8e87abe3d3d6dcab3115dfa\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-76f75df574-hzf8c" Dec 13 14:15:21.956031 kubelet[3066]: E1213 14:15:21.951602 3066 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-76f75df574-hzf8c_kube-system(07b86ac8-84b4-4807-aaee-92f8a5bbaa89)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-76f75df574-hzf8c_kube-system(07b86ac8-84b4-4807-aaee-92f8a5bbaa89)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"4efd2f0a680ad6d670ab93646b15d79ac1cbbc75b8e87abe3d3d6dcab3115dfa\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-hzf8c" podUID="07b86ac8-84b4-4807-aaee-92f8a5bbaa89" Dec 13 14:15:21.960630 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-fd62489a291fe65369fc57679c6a79016dcb022de2a65ff0cb240039c436bada-shm.mount: Deactivated successfully. Dec 13 14:15:21.963083 env[1818]: time="2024-12-13T14:15:21.963004819Z" level=error msg="encountered an error cleaning up failed sandbox \"fd62489a291fe65369fc57679c6a79016dcb022de2a65ff0cb240039c436bada\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:15:21.963388 env[1818]: time="2024-12-13T14:15:21.963332314Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-8878db5b5-czf6j,Uid:8da61845-6202-427b-9fcf-1b4b4a040aed,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"fd62489a291fe65369fc57679c6a79016dcb022de2a65ff0cb240039c436bada\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:15:21.963978 kubelet[3066]: E1213 14:15:21.963890 3066 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"fd62489a291fe65369fc57679c6a79016dcb022de2a65ff0cb240039c436bada\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:15:21.964719 kubelet[3066]: E1213 14:15:21.964181 3066 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"fd62489a291fe65369fc57679c6a79016dcb022de2a65ff0cb240039c436bada\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-8878db5b5-czf6j" Dec 13 14:15:21.964719 kubelet[3066]: E1213 14:15:21.964237 3066 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"fd62489a291fe65369fc57679c6a79016dcb022de2a65ff0cb240039c436bada\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-8878db5b5-czf6j" Dec 13 14:15:21.964719 kubelet[3066]: E1213 14:15:21.964326 3066 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-8878db5b5-czf6j_calico-apiserver(8da61845-6202-427b-9fcf-1b4b4a040aed)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-8878db5b5-czf6j_calico-apiserver(8da61845-6202-427b-9fcf-1b4b4a040aed)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"fd62489a291fe65369fc57679c6a79016dcb022de2a65ff0cb240039c436bada\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-8878db5b5-czf6j" podUID="8da61845-6202-427b-9fcf-1b4b4a040aed" Dec 13 14:15:21.976627 env[1818]: time="2024-12-13T14:15:21.976539353Z" level=error msg="Failed to destroy network for sandbox \"e099ef2e1e3bc483dbe1d9dee04d0daddb09d4c56697af84981172bca0b8a579\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:15:21.988386 env[1818]: time="2024-12-13T14:15:21.983683177Z" level=error msg="Failed to destroy network for sandbox \"9b54c2d2c7a66991a186af63a0fea2aaa4b9612969afd62fc0ef6c84e1feeea1\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:15:21.988386 env[1818]: time="2024-12-13T14:15:21.984530251Z" level=error msg="encountered an error cleaning up failed sandbox \"9b54c2d2c7a66991a186af63a0fea2aaa4b9612969afd62fc0ef6c84e1feeea1\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:15:21.988386 env[1818]: time="2024-12-13T14:15:21.984706605Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-5kblv,Uid:ba6ec834-0540-4939-8d56-4186c0a4284f,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"9b54c2d2c7a66991a186af63a0fea2aaa4b9612969afd62fc0ef6c84e1feeea1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:15:21.988386 env[1818]: time="2024-12-13T14:15:21.985170180Z" level=error msg="encountered an error cleaning up failed sandbox \"e099ef2e1e3bc483dbe1d9dee04d0daddb09d4c56697af84981172bca0b8a579\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:15:21.988386 env[1818]: time="2024-12-13T14:15:21.985238209Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-r2mtx,Uid:598fbb62-2ff1-4c40-b8a5-720bd020a409,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"e099ef2e1e3bc483dbe1d9dee04d0daddb09d4c56697af84981172bca0b8a579\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:15:21.987076 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-e099ef2e1e3bc483dbe1d9dee04d0daddb09d4c56697af84981172bca0b8a579-shm.mount: Deactivated successfully. Dec 13 14:15:21.989044 kubelet[3066]: E1213 14:15:21.985577 3066 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e099ef2e1e3bc483dbe1d9dee04d0daddb09d4c56697af84981172bca0b8a579\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:15:21.989044 kubelet[3066]: E1213 14:15:21.985646 3066 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e099ef2e1e3bc483dbe1d9dee04d0daddb09d4c56697af84981172bca0b8a579\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-r2mtx" Dec 13 14:15:21.989044 kubelet[3066]: E1213 14:15:21.985689 3066 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e099ef2e1e3bc483dbe1d9dee04d0daddb09d4c56697af84981172bca0b8a579\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-r2mtx" Dec 13 14:15:21.989334 kubelet[3066]: E1213 14:15:21.985770 3066 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-r2mtx_calico-system(598fbb62-2ff1-4c40-b8a5-720bd020a409)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-r2mtx_calico-system(598fbb62-2ff1-4c40-b8a5-720bd020a409)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"e099ef2e1e3bc483dbe1d9dee04d0daddb09d4c56697af84981172bca0b8a579\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-r2mtx" podUID="598fbb62-2ff1-4c40-b8a5-720bd020a409" Dec 13 14:15:21.989576 kubelet[3066]: E1213 14:15:21.989481 3066 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9b54c2d2c7a66991a186af63a0fea2aaa4b9612969afd62fc0ef6c84e1feeea1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:15:21.989576 kubelet[3066]: E1213 14:15:21.989565 3066 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9b54c2d2c7a66991a186af63a0fea2aaa4b9612969afd62fc0ef6c84e1feeea1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-76f75df574-5kblv" Dec 13 14:15:21.989788 kubelet[3066]: E1213 14:15:21.989608 3066 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9b54c2d2c7a66991a186af63a0fea2aaa4b9612969afd62fc0ef6c84e1feeea1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-76f75df574-5kblv" Dec 13 14:15:21.989788 kubelet[3066]: E1213 14:15:21.989703 3066 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-76f75df574-5kblv_kube-system(ba6ec834-0540-4939-8d56-4186c0a4284f)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-76f75df574-5kblv_kube-system(ba6ec834-0540-4939-8d56-4186c0a4284f)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"9b54c2d2c7a66991a186af63a0fea2aaa4b9612969afd62fc0ef6c84e1feeea1\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-5kblv" podUID="ba6ec834-0540-4939-8d56-4186c0a4284f" Dec 13 14:15:21.996816 env[1818]: time="2024-12-13T14:15:21.996675138Z" level=error msg="Failed to destroy network for sandbox \"7e68373161df4d8c1efce295e827b9367fb698838bb827165039f5e538e06d51\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:15:21.998556 env[1818]: time="2024-12-13T14:15:21.998489504Z" level=error msg="encountered an error cleaning up failed sandbox \"7e68373161df4d8c1efce295e827b9367fb698838bb827165039f5e538e06d51\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:15:21.998771 env[1818]: time="2024-12-13T14:15:21.998723038Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-747dd4679c-kfxmw,Uid:55f96ceb-5c45-4365-b359-551ac19183ea,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"7e68373161df4d8c1efce295e827b9367fb698838bb827165039f5e538e06d51\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:15:21.999303 kubelet[3066]: E1213 14:15:21.999262 3066 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7e68373161df4d8c1efce295e827b9367fb698838bb827165039f5e538e06d51\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:15:21.999490 kubelet[3066]: E1213 14:15:21.999339 3066 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7e68373161df4d8c1efce295e827b9367fb698838bb827165039f5e538e06d51\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-747dd4679c-kfxmw" Dec 13 14:15:21.999490 kubelet[3066]: E1213 14:15:21.999379 3066 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7e68373161df4d8c1efce295e827b9367fb698838bb827165039f5e538e06d51\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-747dd4679c-kfxmw" Dec 13 14:15:21.999619 kubelet[3066]: E1213 14:15:21.999511 3066 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-747dd4679c-kfxmw_calico-system(55f96ceb-5c45-4365-b359-551ac19183ea)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-747dd4679c-kfxmw_calico-system(55f96ceb-5c45-4365-b359-551ac19183ea)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"7e68373161df4d8c1efce295e827b9367fb698838bb827165039f5e538e06d51\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-747dd4679c-kfxmw" podUID="55f96ceb-5c45-4365-b359-551ac19183ea" Dec 13 14:15:22.571391 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-7e68373161df4d8c1efce295e827b9367fb698838bb827165039f5e538e06d51-shm.mount: Deactivated successfully. Dec 13 14:15:22.571600 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-9b54c2d2c7a66991a186af63a0fea2aaa4b9612969afd62fc0ef6c84e1feeea1-shm.mount: Deactivated successfully. Dec 13 14:15:22.610515 kubelet[3066]: I1213 14:15:22.610471 3066 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="7e68373161df4d8c1efce295e827b9367fb698838bb827165039f5e538e06d51" Dec 13 14:15:22.612125 env[1818]: time="2024-12-13T14:15:22.612058529Z" level=info msg="StopPodSandbox for \"7e68373161df4d8c1efce295e827b9367fb698838bb827165039f5e538e06d51\"" Dec 13 14:15:22.613799 kubelet[3066]: I1213 14:15:22.613744 3066 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="429c2476fb25426d228c324ac7a91243ab78ad777b796c38b9f5ab890adce0da" Dec 13 14:15:22.614672 env[1818]: time="2024-12-13T14:15:22.614601781Z" level=info msg="StopPodSandbox for \"429c2476fb25426d228c324ac7a91243ab78ad777b796c38b9f5ab890adce0da\"" Dec 13 14:15:22.617172 kubelet[3066]: I1213 14:15:22.617087 3066 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="4efd2f0a680ad6d670ab93646b15d79ac1cbbc75b8e87abe3d3d6dcab3115dfa" Dec 13 14:15:22.619126 env[1818]: time="2024-12-13T14:15:22.618251741Z" level=info msg="StopPodSandbox for \"4efd2f0a680ad6d670ab93646b15d79ac1cbbc75b8e87abe3d3d6dcab3115dfa\"" Dec 13 14:15:22.627573 kubelet[3066]: I1213 14:15:22.626911 3066 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="fd62489a291fe65369fc57679c6a79016dcb022de2a65ff0cb240039c436bada" Dec 13 14:15:22.628283 env[1818]: time="2024-12-13T14:15:22.628232698Z" level=info msg="StopPodSandbox for \"fd62489a291fe65369fc57679c6a79016dcb022de2a65ff0cb240039c436bada\"" Dec 13 14:15:22.634482 kubelet[3066]: I1213 14:15:22.634399 3066 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="e099ef2e1e3bc483dbe1d9dee04d0daddb09d4c56697af84981172bca0b8a579" Dec 13 14:15:22.639112 env[1818]: time="2024-12-13T14:15:22.639059697Z" level=info msg="StopPodSandbox for \"e099ef2e1e3bc483dbe1d9dee04d0daddb09d4c56697af84981172bca0b8a579\"" Dec 13 14:15:22.649113 kubelet[3066]: I1213 14:15:22.647447 3066 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="9b54c2d2c7a66991a186af63a0fea2aaa4b9612969afd62fc0ef6c84e1feeea1" Dec 13 14:15:22.649316 env[1818]: time="2024-12-13T14:15:22.649128867Z" level=info msg="StopPodSandbox for \"9b54c2d2c7a66991a186af63a0fea2aaa4b9612969afd62fc0ef6c84e1feeea1\"" Dec 13 14:15:22.799688 env[1818]: time="2024-12-13T14:15:22.799600282Z" level=error msg="StopPodSandbox for \"429c2476fb25426d228c324ac7a91243ab78ad777b796c38b9f5ab890adce0da\" failed" error="failed to destroy network for sandbox \"429c2476fb25426d228c324ac7a91243ab78ad777b796c38b9f5ab890adce0da\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:15:22.800345 kubelet[3066]: E1213 14:15:22.800063 3066 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"429c2476fb25426d228c324ac7a91243ab78ad777b796c38b9f5ab890adce0da\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="429c2476fb25426d228c324ac7a91243ab78ad777b796c38b9f5ab890adce0da" Dec 13 14:15:22.800345 kubelet[3066]: E1213 14:15:22.800178 3066 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"429c2476fb25426d228c324ac7a91243ab78ad777b796c38b9f5ab890adce0da"} Dec 13 14:15:22.800345 kubelet[3066]: E1213 14:15:22.800251 3066 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"aa265595-980c-417f-a569-c324ec426ee4\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"429c2476fb25426d228c324ac7a91243ab78ad777b796c38b9f5ab890adce0da\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:15:22.800345 kubelet[3066]: E1213 14:15:22.800309 3066 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"aa265595-980c-417f-a569-c324ec426ee4\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"429c2476fb25426d228c324ac7a91243ab78ad777b796c38b9f5ab890adce0da\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-8878db5b5-qh9tk" podUID="aa265595-980c-417f-a569-c324ec426ee4" Dec 13 14:15:22.809220 env[1818]: time="2024-12-13T14:15:22.809114340Z" level=error msg="StopPodSandbox for \"7e68373161df4d8c1efce295e827b9367fb698838bb827165039f5e538e06d51\" failed" error="failed to destroy network for sandbox \"7e68373161df4d8c1efce295e827b9367fb698838bb827165039f5e538e06d51\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:15:22.809578 kubelet[3066]: E1213 14:15:22.809540 3066 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"7e68373161df4d8c1efce295e827b9367fb698838bb827165039f5e538e06d51\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="7e68373161df4d8c1efce295e827b9367fb698838bb827165039f5e538e06d51" Dec 13 14:15:22.809720 kubelet[3066]: E1213 14:15:22.809630 3066 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"7e68373161df4d8c1efce295e827b9367fb698838bb827165039f5e538e06d51"} Dec 13 14:15:22.809797 kubelet[3066]: E1213 14:15:22.809724 3066 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"55f96ceb-5c45-4365-b359-551ac19183ea\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7e68373161df4d8c1efce295e827b9367fb698838bb827165039f5e538e06d51\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:15:22.809927 kubelet[3066]: E1213 14:15:22.809814 3066 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"55f96ceb-5c45-4365-b359-551ac19183ea\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7e68373161df4d8c1efce295e827b9367fb698838bb827165039f5e538e06d51\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-747dd4679c-kfxmw" podUID="55f96ceb-5c45-4365-b359-551ac19183ea" Dec 13 14:15:22.822347 env[1818]: time="2024-12-13T14:15:22.822154576Z" level=error msg="StopPodSandbox for \"4efd2f0a680ad6d670ab93646b15d79ac1cbbc75b8e87abe3d3d6dcab3115dfa\" failed" error="failed to destroy network for sandbox \"4efd2f0a680ad6d670ab93646b15d79ac1cbbc75b8e87abe3d3d6dcab3115dfa\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:15:22.823510 kubelet[3066]: E1213 14:15:22.823284 3066 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"4efd2f0a680ad6d670ab93646b15d79ac1cbbc75b8e87abe3d3d6dcab3115dfa\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="4efd2f0a680ad6d670ab93646b15d79ac1cbbc75b8e87abe3d3d6dcab3115dfa" Dec 13 14:15:22.823510 kubelet[3066]: E1213 14:15:22.823355 3066 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"4efd2f0a680ad6d670ab93646b15d79ac1cbbc75b8e87abe3d3d6dcab3115dfa"} Dec 13 14:15:22.824124 kubelet[3066]: E1213 14:15:22.824014 3066 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"07b86ac8-84b4-4807-aaee-92f8a5bbaa89\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"4efd2f0a680ad6d670ab93646b15d79ac1cbbc75b8e87abe3d3d6dcab3115dfa\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:15:22.824124 kubelet[3066]: E1213 14:15:22.824087 3066 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"07b86ac8-84b4-4807-aaee-92f8a5bbaa89\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"4efd2f0a680ad6d670ab93646b15d79ac1cbbc75b8e87abe3d3d6dcab3115dfa\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-hzf8c" podUID="07b86ac8-84b4-4807-aaee-92f8a5bbaa89" Dec 13 14:15:22.840311 env[1818]: time="2024-12-13T14:15:22.840218352Z" level=error msg="StopPodSandbox for \"fd62489a291fe65369fc57679c6a79016dcb022de2a65ff0cb240039c436bada\" failed" error="failed to destroy network for sandbox \"fd62489a291fe65369fc57679c6a79016dcb022de2a65ff0cb240039c436bada\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:15:22.841158 kubelet[3066]: E1213 14:15:22.840929 3066 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"fd62489a291fe65369fc57679c6a79016dcb022de2a65ff0cb240039c436bada\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="fd62489a291fe65369fc57679c6a79016dcb022de2a65ff0cb240039c436bada" Dec 13 14:15:22.841158 kubelet[3066]: E1213 14:15:22.840996 3066 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"fd62489a291fe65369fc57679c6a79016dcb022de2a65ff0cb240039c436bada"} Dec 13 14:15:22.841158 kubelet[3066]: E1213 14:15:22.841064 3066 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"8da61845-6202-427b-9fcf-1b4b4a040aed\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"fd62489a291fe65369fc57679c6a79016dcb022de2a65ff0cb240039c436bada\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:15:22.841158 kubelet[3066]: E1213 14:15:22.841122 3066 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"8da61845-6202-427b-9fcf-1b4b4a040aed\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"fd62489a291fe65369fc57679c6a79016dcb022de2a65ff0cb240039c436bada\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-8878db5b5-czf6j" podUID="8da61845-6202-427b-9fcf-1b4b4a040aed" Dec 13 14:15:22.853825 env[1818]: time="2024-12-13T14:15:22.853677535Z" level=error msg="StopPodSandbox for \"e099ef2e1e3bc483dbe1d9dee04d0daddb09d4c56697af84981172bca0b8a579\" failed" error="failed to destroy network for sandbox \"e099ef2e1e3bc483dbe1d9dee04d0daddb09d4c56697af84981172bca0b8a579\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:15:22.854648 kubelet[3066]: E1213 14:15:22.854400 3066 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"e099ef2e1e3bc483dbe1d9dee04d0daddb09d4c56697af84981172bca0b8a579\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="e099ef2e1e3bc483dbe1d9dee04d0daddb09d4c56697af84981172bca0b8a579" Dec 13 14:15:22.855133 env[1818]: time="2024-12-13T14:15:22.855066678Z" level=error msg="StopPodSandbox for \"9b54c2d2c7a66991a186af63a0fea2aaa4b9612969afd62fc0ef6c84e1feeea1\" failed" error="failed to destroy network for sandbox \"9b54c2d2c7a66991a186af63a0fea2aaa4b9612969afd62fc0ef6c84e1feeea1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:15:22.856552 kubelet[3066]: E1213 14:15:22.854501 3066 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"e099ef2e1e3bc483dbe1d9dee04d0daddb09d4c56697af84981172bca0b8a579"} Dec 13 14:15:22.856552 kubelet[3066]: E1213 14:15:22.855477 3066 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"598fbb62-2ff1-4c40-b8a5-720bd020a409\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e099ef2e1e3bc483dbe1d9dee04d0daddb09d4c56697af84981172bca0b8a579\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:15:22.856552 kubelet[3066]: E1213 14:15:22.855570 3066 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"598fbb62-2ff1-4c40-b8a5-720bd020a409\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e099ef2e1e3bc483dbe1d9dee04d0daddb09d4c56697af84981172bca0b8a579\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-r2mtx" podUID="598fbb62-2ff1-4c40-b8a5-720bd020a409" Dec 13 14:15:22.857635 kubelet[3066]: E1213 14:15:22.857523 3066 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"9b54c2d2c7a66991a186af63a0fea2aaa4b9612969afd62fc0ef6c84e1feeea1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="9b54c2d2c7a66991a186af63a0fea2aaa4b9612969afd62fc0ef6c84e1feeea1" Dec 13 14:15:22.857635 kubelet[3066]: E1213 14:15:22.857617 3066 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"9b54c2d2c7a66991a186af63a0fea2aaa4b9612969afd62fc0ef6c84e1feeea1"} Dec 13 14:15:22.857872 kubelet[3066]: E1213 14:15:22.857708 3066 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"ba6ec834-0540-4939-8d56-4186c0a4284f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9b54c2d2c7a66991a186af63a0fea2aaa4b9612969afd62fc0ef6c84e1feeea1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:15:22.857872 kubelet[3066]: E1213 14:15:22.857787 3066 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"ba6ec834-0540-4939-8d56-4186c0a4284f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9b54c2d2c7a66991a186af63a0fea2aaa4b9612969afd62fc0ef6c84e1feeea1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-5kblv" podUID="ba6ec834-0540-4939-8d56-4186c0a4284f" Dec 13 14:15:31.109590 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1456478642.mount: Deactivated successfully. Dec 13 14:15:31.191579 env[1818]: time="2024-12-13T14:15:31.191487751Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:15:31.194330 env[1818]: time="2024-12-13T14:15:31.194262082Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:680b8c280812d12c035ca9f0deedea7c761afe0f1cc65109ea2f96bf63801758,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:15:31.197677 env[1818]: time="2024-12-13T14:15:31.197628546Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:15:31.199627 env[1818]: time="2024-12-13T14:15:31.199580650Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:99c3917516efe1f807a0cfdf2d14b628b7c5cc6bd8a9ee5a253154f31756bea1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:15:31.201233 env[1818]: time="2024-12-13T14:15:31.201128368Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\" returns image reference \"sha256:680b8c280812d12c035ca9f0deedea7c761afe0f1cc65109ea2f96bf63801758\"" Dec 13 14:15:31.238465 env[1818]: time="2024-12-13T14:15:31.238330179Z" level=info msg="CreateContainer within sandbox \"ffb4b3567f5bfcf93f2680a29cfffd6d26d8cf1bc3d5e3c7714b1c74b6c57c6b\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Dec 13 14:15:31.264886 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2718864097.mount: Deactivated successfully. Dec 13 14:15:31.271744 env[1818]: time="2024-12-13T14:15:31.271615371Z" level=info msg="CreateContainer within sandbox \"ffb4b3567f5bfcf93f2680a29cfffd6d26d8cf1bc3d5e3c7714b1c74b6c57c6b\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"1e8797ae33a4253a5d34ec17f2b3fb7160c980bfe3c8132ebd8ccf9ce8e52006\"" Dec 13 14:15:31.275000 env[1818]: time="2024-12-13T14:15:31.274798685Z" level=info msg="StartContainer for \"1e8797ae33a4253a5d34ec17f2b3fb7160c980bfe3c8132ebd8ccf9ce8e52006\"" Dec 13 14:15:31.313103 systemd[1]: Started cri-containerd-1e8797ae33a4253a5d34ec17f2b3fb7160c980bfe3c8132ebd8ccf9ce8e52006.scope. Dec 13 14:15:31.354000 audit[4148]: AVC avc: denied { perfmon } for pid=4148 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:31.358411 kernel: kauditd_printk_skb: 34 callbacks suppressed Dec 13 14:15:31.358534 kernel: audit: type=1400 audit(1734099331.354:1011): avc: denied { perfmon } for pid=4148 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:31.354000 audit[4148]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=400014d5a0 a2=3c a3=0 items=0 ppid=3510 pid=4148 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:31.376122 kernel: audit: type=1300 audit(1734099331.354:1011): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=400014d5a0 a2=3c a3=0 items=0 ppid=3510 pid=4148 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:31.354000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3165383739376165333361343235336135643334656331376632623366 Dec 13 14:15:31.386856 kernel: audit: type=1327 audit(1734099331.354:1011): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3165383739376165333361343235336135643334656331376632623366 Dec 13 14:15:31.354000 audit[4148]: AVC avc: denied { bpf } for pid=4148 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:31.354000 audit[4148]: AVC avc: denied { bpf } for pid=4148 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:31.409559 kernel: audit: type=1400 audit(1734099331.354:1012): avc: denied { bpf } for pid=4148 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:31.409726 kernel: audit: type=1400 audit(1734099331.354:1012): avc: denied { bpf } for pid=4148 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:31.409784 kernel: audit: type=1400 audit(1734099331.354:1012): avc: denied { bpf } for pid=4148 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:31.354000 audit[4148]: AVC avc: denied { bpf } for pid=4148 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:31.354000 audit[4148]: AVC avc: denied { perfmon } for pid=4148 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:31.425450 kernel: audit: type=1400 audit(1734099331.354:1012): avc: denied { perfmon } for pid=4148 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:31.354000 audit[4148]: AVC avc: denied { perfmon } for pid=4148 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:31.434350 kernel: audit: type=1400 audit(1734099331.354:1012): avc: denied { perfmon } for pid=4148 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:31.354000 audit[4148]: AVC avc: denied { perfmon } for pid=4148 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:31.440690 env[1818]: time="2024-12-13T14:15:31.440621175Z" level=info msg="StartContainer for \"1e8797ae33a4253a5d34ec17f2b3fb7160c980bfe3c8132ebd8ccf9ce8e52006\" returns successfully" Dec 13 14:15:31.442296 kernel: audit: type=1400 audit(1734099331.354:1012): avc: denied { perfmon } for pid=4148 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:31.354000 audit[4148]: AVC avc: denied { perfmon } for pid=4148 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:31.450890 kernel: audit: type=1400 audit(1734099331.354:1012): avc: denied { perfmon } for pid=4148 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:31.354000 audit[4148]: AVC avc: denied { perfmon } for pid=4148 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:31.354000 audit[4148]: AVC avc: denied { bpf } for pid=4148 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:31.354000 audit[4148]: AVC avc: denied { bpf } for pid=4148 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:31.354000 audit: BPF prog-id=142 op=LOAD Dec 13 14:15:31.354000 audit[4148]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400014d8e0 a2=78 a3=0 items=0 ppid=3510 pid=4148 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:31.354000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3165383739376165333361343235336135643334656331376632623366 Dec 13 14:15:31.354000 audit[4148]: AVC avc: denied { bpf } for pid=4148 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:31.354000 audit[4148]: AVC avc: denied { bpf } for pid=4148 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:31.354000 audit[4148]: AVC avc: denied { perfmon } for pid=4148 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:31.354000 audit[4148]: AVC avc: denied { perfmon } for pid=4148 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:31.354000 audit[4148]: AVC avc: denied { perfmon } for pid=4148 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:31.354000 audit[4148]: AVC avc: denied { perfmon } for pid=4148 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:31.354000 audit[4148]: AVC avc: denied { perfmon } for pid=4148 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:31.354000 audit[4148]: AVC avc: denied { bpf } for pid=4148 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:31.354000 audit[4148]: AVC avc: denied { bpf } for pid=4148 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:31.354000 audit: BPF prog-id=143 op=LOAD Dec 13 14:15:31.354000 audit[4148]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=400014d670 a2=78 a3=0 items=0 ppid=3510 pid=4148 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:31.354000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3165383739376165333361343235336135643334656331376632623366 Dec 13 14:15:31.355000 audit: BPF prog-id=143 op=UNLOAD Dec 13 14:15:31.355000 audit: BPF prog-id=142 op=UNLOAD Dec 13 14:15:31.355000 audit[4148]: AVC avc: denied { bpf } for pid=4148 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:31.355000 audit[4148]: AVC avc: denied { bpf } for pid=4148 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:31.355000 audit[4148]: AVC avc: denied { bpf } for pid=4148 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:31.355000 audit[4148]: AVC avc: denied { perfmon } for pid=4148 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:31.355000 audit[4148]: AVC avc: denied { perfmon } for pid=4148 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:31.355000 audit[4148]: AVC avc: denied { perfmon } for pid=4148 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:31.355000 audit[4148]: AVC avc: denied { perfmon } for pid=4148 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:31.355000 audit[4148]: AVC avc: denied { perfmon } for pid=4148 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:31.355000 audit[4148]: AVC avc: denied { bpf } for pid=4148 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:31.355000 audit[4148]: AVC avc: denied { bpf } for pid=4148 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:31.355000 audit: BPF prog-id=144 op=LOAD Dec 13 14:15:31.355000 audit[4148]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400014db40 a2=78 a3=0 items=0 ppid=3510 pid=4148 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:31.355000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3165383739376165333361343235336135643334656331376632623366 Dec 13 14:15:31.579064 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Dec 13 14:15:31.579265 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Dec 13 14:15:31.724587 kubelet[3066]: I1213 14:15:31.723961 3066 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-sfn7p" podStartSLOduration=1.267506423 podStartE2EDuration="24.723895643s" podCreationTimestamp="2024-12-13 14:15:07 +0000 UTC" firstStartedPulling="2024-12-13 14:15:07.745232446 +0000 UTC m=+25.587505899" lastFinishedPulling="2024-12-13 14:15:31.201621654 +0000 UTC m=+49.043895119" observedRunningTime="2024-12-13 14:15:31.72313877 +0000 UTC m=+49.565412235" watchObservedRunningTime="2024-12-13 14:15:31.723895643 +0000 UTC m=+49.566169096" Dec 13 14:15:33.326000 audit[4312]: AVC avc: denied { write } for pid=4312 comm="tee" name="fd" dev="proc" ino=21325 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:15:33.326000 audit[4312]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff5c2fa08 a2=241 a3=1b6 items=1 ppid=4264 pid=4312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:33.326000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Dec 13 14:15:33.326000 audit: PATH item=0 name="/dev/fd/63" inode=21322 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:15:33.326000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:15:33.301000 audit[4295]: AVC avc: denied { write } for pid=4295 comm="tee" name="fd" dev="proc" ino=21327 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:15:33.301000 audit[4295]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffcf44ea09 a2=241 a3=1b6 items=1 ppid=4259 pid=4295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:33.301000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Dec 13 14:15:33.301000 audit: PATH item=0 name="/dev/fd/63" inode=22041 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:15:33.301000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:15:33.357000 audit[4320]: AVC avc: denied { write } for pid=4320 comm="tee" name="fd" dev="proc" ino=21335 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:15:33.362000 audit[4300]: AVC avc: denied { write } for pid=4300 comm="tee" name="fd" dev="proc" ino=22067 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:15:33.357000 audit[4320]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffc7955a18 a2=241 a3=1b6 items=1 ppid=4268 pid=4320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:33.357000 audit: CWD cwd="/etc/service/enabled/bird6/log" Dec 13 14:15:33.357000 audit: PATH item=0 name="/dev/fd/63" inode=21332 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:15:33.357000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:15:33.370000 audit[4302]: AVC avc: denied { write } for pid=4302 comm="tee" name="fd" dev="proc" ino=22071 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:15:33.362000 audit[4300]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffff751a19 a2=241 a3=1b6 items=1 ppid=4257 pid=4300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:33.362000 audit: CWD cwd="/etc/service/enabled/bird/log" Dec 13 14:15:33.362000 audit: PATH item=0 name="/dev/fd/63" inode=22056 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:15:33.362000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:15:33.383000 audit[4310]: AVC avc: denied { write } for pid=4310 comm="tee" name="fd" dev="proc" ino=22075 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:15:33.383000 audit[4315]: AVC avc: denied { write } for pid=4315 comm="tee" name="fd" dev="proc" ino=22078 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:15:33.383000 audit[4310]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffcd821a1a a2=241 a3=1b6 items=1 ppid=4260 pid=4310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:33.383000 audit: CWD cwd="/etc/service/enabled/cni/log" Dec 13 14:15:33.383000 audit: PATH item=0 name="/dev/fd/63" inode=22061 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:15:33.383000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:15:33.370000 audit[4302]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffda104a18 a2=241 a3=1b6 items=1 ppid=4277 pid=4302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:33.370000 audit: CWD cwd="/etc/service/enabled/confd/log" Dec 13 14:15:33.370000 audit: PATH item=0 name="/dev/fd/63" inode=21321 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:15:33.370000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:15:33.383000 audit[4315]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff52c3a18 a2=241 a3=1b6 items=1 ppid=4256 pid=4315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:33.383000 audit: CWD cwd="/etc/service/enabled/felix/log" Dec 13 14:15:33.383000 audit: PATH item=0 name="/dev/fd/63" inode=21329 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:15:33.383000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:15:33.400402 env[1818]: time="2024-12-13T14:15:33.399830155Z" level=info msg="StopPodSandbox for \"429c2476fb25426d228c324ac7a91243ab78ad777b796c38b9f5ab890adce0da\"" Dec 13 14:15:33.588228 kubelet[3066]: I1213 14:15:33.588075 3066 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 14:15:33.758692 env[1818]: 2024-12-13 14:15:33.553 [INFO][4346] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="429c2476fb25426d228c324ac7a91243ab78ad777b796c38b9f5ab890adce0da" Dec 13 14:15:33.758692 env[1818]: 2024-12-13 14:15:33.553 [INFO][4346] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="429c2476fb25426d228c324ac7a91243ab78ad777b796c38b9f5ab890adce0da" iface="eth0" netns="/var/run/netns/cni-3416f8ba-562e-2426-2dde-8c31350fa063" Dec 13 14:15:33.758692 env[1818]: 2024-12-13 14:15:33.553 [INFO][4346] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="429c2476fb25426d228c324ac7a91243ab78ad777b796c38b9f5ab890adce0da" iface="eth0" netns="/var/run/netns/cni-3416f8ba-562e-2426-2dde-8c31350fa063" Dec 13 14:15:33.758692 env[1818]: 2024-12-13 14:15:33.554 [INFO][4346] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="429c2476fb25426d228c324ac7a91243ab78ad777b796c38b9f5ab890adce0da" iface="eth0" netns="/var/run/netns/cni-3416f8ba-562e-2426-2dde-8c31350fa063" Dec 13 14:15:33.758692 env[1818]: 2024-12-13 14:15:33.554 [INFO][4346] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="429c2476fb25426d228c324ac7a91243ab78ad777b796c38b9f5ab890adce0da" Dec 13 14:15:33.758692 env[1818]: 2024-12-13 14:15:33.554 [INFO][4346] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="429c2476fb25426d228c324ac7a91243ab78ad777b796c38b9f5ab890adce0da" Dec 13 14:15:33.758692 env[1818]: 2024-12-13 14:15:33.655 [INFO][4352] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="429c2476fb25426d228c324ac7a91243ab78ad777b796c38b9f5ab890adce0da" HandleID="k8s-pod-network.429c2476fb25426d228c324ac7a91243ab78ad777b796c38b9f5ab890adce0da" Workload="ip--172--31--18--231-k8s-calico--apiserver--8878db5b5--qh9tk-eth0" Dec 13 14:15:33.758692 env[1818]: 2024-12-13 14:15:33.656 [INFO][4352] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:15:33.758692 env[1818]: 2024-12-13 14:15:33.656 [INFO][4352] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:15:33.758692 env[1818]: 2024-12-13 14:15:33.738 [WARNING][4352] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="429c2476fb25426d228c324ac7a91243ab78ad777b796c38b9f5ab890adce0da" HandleID="k8s-pod-network.429c2476fb25426d228c324ac7a91243ab78ad777b796c38b9f5ab890adce0da" Workload="ip--172--31--18--231-k8s-calico--apiserver--8878db5b5--qh9tk-eth0" Dec 13 14:15:33.758692 env[1818]: 2024-12-13 14:15:33.738 [INFO][4352] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="429c2476fb25426d228c324ac7a91243ab78ad777b796c38b9f5ab890adce0da" HandleID="k8s-pod-network.429c2476fb25426d228c324ac7a91243ab78ad777b796c38b9f5ab890adce0da" Workload="ip--172--31--18--231-k8s-calico--apiserver--8878db5b5--qh9tk-eth0" Dec 13 14:15:33.758692 env[1818]: 2024-12-13 14:15:33.749 [INFO][4352] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:15:33.758692 env[1818]: 2024-12-13 14:15:33.755 [INFO][4346] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="429c2476fb25426d228c324ac7a91243ab78ad777b796c38b9f5ab890adce0da" Dec 13 14:15:33.768327 env[1818]: time="2024-12-13T14:15:33.768240019Z" level=info msg="TearDown network for sandbox \"429c2476fb25426d228c324ac7a91243ab78ad777b796c38b9f5ab890adce0da\" successfully" Dec 13 14:15:33.768327 env[1818]: time="2024-12-13T14:15:33.768308865Z" level=info msg="StopPodSandbox for \"429c2476fb25426d228c324ac7a91243ab78ad777b796c38b9f5ab890adce0da\" returns successfully" Dec 13 14:15:33.769494 systemd[1]: run-netns-cni\x2d3416f8ba\x2d562e\x2d2426\x2d2dde\x2d8c31350fa063.mount: Deactivated successfully. Dec 13 14:15:33.771821 env[1818]: time="2024-12-13T14:15:33.771765927Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-8878db5b5-qh9tk,Uid:aa265595-980c-417f-a569-c324ec426ee4,Namespace:calico-apiserver,Attempt:1,}" Dec 13 14:15:33.881000 audit[4372]: NETFILTER_CFG table=filter:97 family=2 entries=17 op=nft_register_rule pid=4372 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:15:33.881000 audit[4372]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5908 a0=3 a1=ffffe38b1ca0 a2=0 a3=1 items=0 ppid=3199 pid=4372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:33.881000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:15:33.891000 audit[4372]: NETFILTER_CFG table=nat:98 family=2 entries=19 op=nft_register_chain pid=4372 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:15:33.891000 audit[4372]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6276 a0=3 a1=ffffe38b1ca0 a2=0 a3=1 items=0 ppid=3199 pid=4372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:33.891000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:15:34.036000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.31.18.231:22-139.178.89.65:51574 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:34.037870 systemd[1]: Started sshd@7-172.31.18.231:22-139.178.89.65:51574.service. Dec 13 14:15:34.136360 systemd-networkd[1540]: calic154195ee2a: Link UP Dec 13 14:15:34.142095 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:15:34.142277 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calic154195ee2a: link becomes ready Dec 13 14:15:34.142501 systemd-networkd[1540]: calic154195ee2a: Gained carrier Dec 13 14:15:34.149247 (udev-worker)[4390]: Network interface NamePolicy= disabled on kernel command line. Dec 13 14:15:34.193163 env[1818]: 2024-12-13 14:15:33.879 [INFO][4362] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist Dec 13 14:15:34.193163 env[1818]: 2024-12-13 14:15:33.923 [INFO][4362] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--18--231-k8s-calico--apiserver--8878db5b5--qh9tk-eth0 calico-apiserver-8878db5b5- calico-apiserver aa265595-980c-417f-a569-c324ec426ee4 819 0 2024-12-13 14:15:05 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:8878db5b5 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ip-172-31-18-231 calico-apiserver-8878db5b5-qh9tk eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calic154195ee2a [] []}} ContainerID="02c28e9b95d31b983b95197150c917cfd0dbc61162162d79cbfb0f940d4a3759" Namespace="calico-apiserver" Pod="calico-apiserver-8878db5b5-qh9tk" WorkloadEndpoint="ip--172--31--18--231-k8s-calico--apiserver--8878db5b5--qh9tk-" Dec 13 14:15:34.193163 env[1818]: 2024-12-13 14:15:33.923 [INFO][4362] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="02c28e9b95d31b983b95197150c917cfd0dbc61162162d79cbfb0f940d4a3759" Namespace="calico-apiserver" Pod="calico-apiserver-8878db5b5-qh9tk" WorkloadEndpoint="ip--172--31--18--231-k8s-calico--apiserver--8878db5b5--qh9tk-eth0" Dec 13 14:15:34.193163 env[1818]: 2024-12-13 14:15:34.009 [INFO][4377] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="02c28e9b95d31b983b95197150c917cfd0dbc61162162d79cbfb0f940d4a3759" HandleID="k8s-pod-network.02c28e9b95d31b983b95197150c917cfd0dbc61162162d79cbfb0f940d4a3759" Workload="ip--172--31--18--231-k8s-calico--apiserver--8878db5b5--qh9tk-eth0" Dec 13 14:15:34.193163 env[1818]: 2024-12-13 14:15:34.040 [INFO][4377] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="02c28e9b95d31b983b95197150c917cfd0dbc61162162d79cbfb0f940d4a3759" HandleID="k8s-pod-network.02c28e9b95d31b983b95197150c917cfd0dbc61162162d79cbfb0f940d4a3759" Workload="ip--172--31--18--231-k8s-calico--apiserver--8878db5b5--qh9tk-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400029b620), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ip-172-31-18-231", "pod":"calico-apiserver-8878db5b5-qh9tk", "timestamp":"2024-12-13 14:15:34.009212143 +0000 UTC"}, Hostname:"ip-172-31-18-231", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:15:34.193163 env[1818]: 2024-12-13 14:15:34.040 [INFO][4377] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:15:34.193163 env[1818]: 2024-12-13 14:15:34.040 [INFO][4377] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:15:34.193163 env[1818]: 2024-12-13 14:15:34.041 [INFO][4377] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-18-231' Dec 13 14:15:34.193163 env[1818]: 2024-12-13 14:15:34.046 [INFO][4377] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.02c28e9b95d31b983b95197150c917cfd0dbc61162162d79cbfb0f940d4a3759" host="ip-172-31-18-231" Dec 13 14:15:34.193163 env[1818]: 2024-12-13 14:15:34.055 [INFO][4377] ipam/ipam.go 372: Looking up existing affinities for host host="ip-172-31-18-231" Dec 13 14:15:34.193163 env[1818]: 2024-12-13 14:15:34.070 [INFO][4377] ipam/ipam.go 489: Trying affinity for 192.168.34.128/26 host="ip-172-31-18-231" Dec 13 14:15:34.193163 env[1818]: 2024-12-13 14:15:34.077 [INFO][4377] ipam/ipam.go 155: Attempting to load block cidr=192.168.34.128/26 host="ip-172-31-18-231" Dec 13 14:15:34.193163 env[1818]: 2024-12-13 14:15:34.082 [INFO][4377] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.34.128/26 host="ip-172-31-18-231" Dec 13 14:15:34.193163 env[1818]: 2024-12-13 14:15:34.082 [INFO][4377] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.34.128/26 handle="k8s-pod-network.02c28e9b95d31b983b95197150c917cfd0dbc61162162d79cbfb0f940d4a3759" host="ip-172-31-18-231" Dec 13 14:15:34.193163 env[1818]: 2024-12-13 14:15:34.085 [INFO][4377] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.02c28e9b95d31b983b95197150c917cfd0dbc61162162d79cbfb0f940d4a3759 Dec 13 14:15:34.193163 env[1818]: 2024-12-13 14:15:34.096 [INFO][4377] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.34.128/26 handle="k8s-pod-network.02c28e9b95d31b983b95197150c917cfd0dbc61162162d79cbfb0f940d4a3759" host="ip-172-31-18-231" Dec 13 14:15:34.193163 env[1818]: 2024-12-13 14:15:34.106 [INFO][4377] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.34.129/26] block=192.168.34.128/26 handle="k8s-pod-network.02c28e9b95d31b983b95197150c917cfd0dbc61162162d79cbfb0f940d4a3759" host="ip-172-31-18-231" Dec 13 14:15:34.193163 env[1818]: 2024-12-13 14:15:34.106 [INFO][4377] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.34.129/26] handle="k8s-pod-network.02c28e9b95d31b983b95197150c917cfd0dbc61162162d79cbfb0f940d4a3759" host="ip-172-31-18-231" Dec 13 14:15:34.193163 env[1818]: 2024-12-13 14:15:34.106 [INFO][4377] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:15:34.193163 env[1818]: 2024-12-13 14:15:34.106 [INFO][4377] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.34.129/26] IPv6=[] ContainerID="02c28e9b95d31b983b95197150c917cfd0dbc61162162d79cbfb0f940d4a3759" HandleID="k8s-pod-network.02c28e9b95d31b983b95197150c917cfd0dbc61162162d79cbfb0f940d4a3759" Workload="ip--172--31--18--231-k8s-calico--apiserver--8878db5b5--qh9tk-eth0" Dec 13 14:15:34.194575 env[1818]: 2024-12-13 14:15:34.112 [INFO][4362] cni-plugin/k8s.go 386: Populated endpoint ContainerID="02c28e9b95d31b983b95197150c917cfd0dbc61162162d79cbfb0f940d4a3759" Namespace="calico-apiserver" Pod="calico-apiserver-8878db5b5-qh9tk" WorkloadEndpoint="ip--172--31--18--231-k8s-calico--apiserver--8878db5b5--qh9tk-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--18--231-k8s-calico--apiserver--8878db5b5--qh9tk-eth0", GenerateName:"calico-apiserver-8878db5b5-", Namespace:"calico-apiserver", SelfLink:"", UID:"aa265595-980c-417f-a569-c324ec426ee4", ResourceVersion:"819", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 15, 5, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"8878db5b5", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-18-231", ContainerID:"", Pod:"calico-apiserver-8878db5b5-qh9tk", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.34.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calic154195ee2a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:15:34.194575 env[1818]: 2024-12-13 14:15:34.112 [INFO][4362] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.34.129/32] ContainerID="02c28e9b95d31b983b95197150c917cfd0dbc61162162d79cbfb0f940d4a3759" Namespace="calico-apiserver" Pod="calico-apiserver-8878db5b5-qh9tk" WorkloadEndpoint="ip--172--31--18--231-k8s-calico--apiserver--8878db5b5--qh9tk-eth0" Dec 13 14:15:34.194575 env[1818]: 2024-12-13 14:15:34.112 [INFO][4362] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calic154195ee2a ContainerID="02c28e9b95d31b983b95197150c917cfd0dbc61162162d79cbfb0f940d4a3759" Namespace="calico-apiserver" Pod="calico-apiserver-8878db5b5-qh9tk" WorkloadEndpoint="ip--172--31--18--231-k8s-calico--apiserver--8878db5b5--qh9tk-eth0" Dec 13 14:15:34.194575 env[1818]: 2024-12-13 14:15:34.149 [INFO][4362] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="02c28e9b95d31b983b95197150c917cfd0dbc61162162d79cbfb0f940d4a3759" Namespace="calico-apiserver" Pod="calico-apiserver-8878db5b5-qh9tk" WorkloadEndpoint="ip--172--31--18--231-k8s-calico--apiserver--8878db5b5--qh9tk-eth0" Dec 13 14:15:34.194575 env[1818]: 2024-12-13 14:15:34.150 [INFO][4362] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="02c28e9b95d31b983b95197150c917cfd0dbc61162162d79cbfb0f940d4a3759" Namespace="calico-apiserver" Pod="calico-apiserver-8878db5b5-qh9tk" WorkloadEndpoint="ip--172--31--18--231-k8s-calico--apiserver--8878db5b5--qh9tk-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--18--231-k8s-calico--apiserver--8878db5b5--qh9tk-eth0", GenerateName:"calico-apiserver-8878db5b5-", Namespace:"calico-apiserver", SelfLink:"", UID:"aa265595-980c-417f-a569-c324ec426ee4", ResourceVersion:"819", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 15, 5, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"8878db5b5", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-18-231", ContainerID:"02c28e9b95d31b983b95197150c917cfd0dbc61162162d79cbfb0f940d4a3759", Pod:"calico-apiserver-8878db5b5-qh9tk", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.34.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calic154195ee2a", MAC:"e6:c0:83:4f:9a:70", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:15:34.194575 env[1818]: 2024-12-13 14:15:34.189 [INFO][4362] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="02c28e9b95d31b983b95197150c917cfd0dbc61162162d79cbfb0f940d4a3759" Namespace="calico-apiserver" Pod="calico-apiserver-8878db5b5-qh9tk" WorkloadEndpoint="ip--172--31--18--231-k8s-calico--apiserver--8878db5b5--qh9tk-eth0" Dec 13 14:15:34.230920 env[1818]: time="2024-12-13T14:15:34.230772929Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:15:34.231202 env[1818]: time="2024-12-13T14:15:34.231149115Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:15:34.231467 env[1818]: time="2024-12-13T14:15:34.231378020Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:15:34.232717 env[1818]: time="2024-12-13T14:15:34.232573371Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/02c28e9b95d31b983b95197150c917cfd0dbc61162162d79cbfb0f940d4a3759 pid=4411 runtime=io.containerd.runc.v2 Dec 13 14:15:34.248000 audit[4385]: USER_ACCT pid=4385 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:15:34.250323 sshd[4385]: Accepted publickey for core from 139.178.89.65 port 51574 ssh2: RSA SHA256:07jB2DPJgjjhgg3L8Uh349EZ0zHZFrUiRWNbK+Fdo0Q Dec 13 14:15:34.252000 audit[4385]: CRED_ACQ pid=4385 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:15:34.252000 audit[4385]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd7554930 a2=3 a3=1 items=0 ppid=1 pid=4385 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:34.252000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:15:34.259490 sshd[4385]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:15:34.273061 systemd[1]: Started session-8.scope. Dec 13 14:15:34.274139 systemd-logind[1810]: New session 8 of user core. Dec 13 14:15:34.297000 audit[4385]: USER_START pid=4385 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:15:34.301000 audit[4440]: CRED_ACQ pid=4440 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:15:34.319540 systemd[1]: Started cri-containerd-02c28e9b95d31b983b95197150c917cfd0dbc61162162d79cbfb0f940d4a3759.scope. Dec 13 14:15:34.368000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.368000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.368000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.368000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.368000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.368000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.368000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.368000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.368000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.368000 audit: BPF prog-id=145 op=LOAD Dec 13 14:15:34.368000 audit[4463]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffd46fbe78 a2=98 a3=ffffd46fbe68 items=0 ppid=4258 pid=4463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:34.368000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:15:34.369000 audit: BPF prog-id=145 op=UNLOAD Dec 13 14:15:34.369000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.369000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.369000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.369000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.369000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.369000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.369000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.369000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.369000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.369000 audit: BPF prog-id=146 op=LOAD Dec 13 14:15:34.369000 audit[4463]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffd46fbb08 a2=74 a3=95 items=0 ppid=4258 pid=4463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:34.369000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:15:34.369000 audit: BPF prog-id=146 op=UNLOAD Dec 13 14:15:34.369000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.369000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.369000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.369000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.369000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.369000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.369000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.369000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.369000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.369000 audit: BPF prog-id=147 op=LOAD Dec 13 14:15:34.369000 audit[4463]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffd46fbb68 a2=94 a3=2 items=0 ppid=4258 pid=4463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:34.369000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:15:34.370000 audit: BPF prog-id=147 op=UNLOAD Dec 13 14:15:34.390000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.390000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.390000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.390000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.390000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.390000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.390000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.390000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.390000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.390000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.390000 audit: BPF prog-id=148 op=LOAD Dec 13 14:15:34.392000 audit[4424]: AVC avc: denied { bpf } for pid=4424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.392000 audit[4424]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4411 pid=4424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:34.392000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032633238653962393564333162393833623935313937313530633931 Dec 13 14:15:34.392000 audit[4424]: AVC avc: denied { perfmon } for pid=4424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.392000 audit[4424]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4411 pid=4424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:34.392000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032633238653962393564333162393833623935313937313530633931 Dec 13 14:15:34.392000 audit[4424]: AVC avc: denied { bpf } for pid=4424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.392000 audit[4424]: AVC avc: denied { bpf } for pid=4424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.392000 audit[4424]: AVC avc: denied { bpf } for pid=4424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.392000 audit[4424]: AVC avc: denied { perfmon } for pid=4424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.392000 audit[4424]: AVC avc: denied { perfmon } for pid=4424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.392000 audit[4424]: AVC avc: denied { perfmon } for pid=4424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.392000 audit[4424]: AVC avc: denied { perfmon } for pid=4424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.392000 audit[4424]: AVC avc: denied { perfmon } for pid=4424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.392000 audit[4424]: AVC avc: denied { bpf } for pid=4424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.392000 audit[4424]: AVC avc: denied { bpf } for pid=4424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.392000 audit: BPF prog-id=149 op=LOAD Dec 13 14:15:34.392000 audit[4424]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4411 pid=4424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:34.392000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032633238653962393564333162393833623935313937313530633931 Dec 13 14:15:34.393000 audit[4424]: AVC avc: denied { bpf } for pid=4424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.393000 audit[4424]: AVC avc: denied { bpf } for pid=4424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.393000 audit[4424]: AVC avc: denied { perfmon } for pid=4424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.393000 audit[4424]: AVC avc: denied { perfmon } for pid=4424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.393000 audit[4424]: AVC avc: denied { perfmon } for pid=4424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.393000 audit[4424]: AVC avc: denied { perfmon } for pid=4424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.393000 audit[4424]: AVC avc: denied { perfmon } for pid=4424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.393000 audit[4424]: AVC avc: denied { bpf } for pid=4424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.393000 audit[4424]: AVC avc: denied { bpf } for pid=4424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.393000 audit: BPF prog-id=150 op=LOAD Dec 13 14:15:34.393000 audit[4424]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4411 pid=4424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:34.393000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032633238653962393564333162393833623935313937313530633931 Dec 13 14:15:34.393000 audit: BPF prog-id=150 op=UNLOAD Dec 13 14:15:34.393000 audit: BPF prog-id=149 op=UNLOAD Dec 13 14:15:34.393000 audit[4424]: AVC avc: denied { bpf } for pid=4424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.393000 audit[4424]: AVC avc: denied { bpf } for pid=4424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.393000 audit[4424]: AVC avc: denied { bpf } for pid=4424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.393000 audit[4424]: AVC avc: denied { perfmon } for pid=4424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.393000 audit[4424]: AVC avc: denied { perfmon } for pid=4424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.393000 audit[4424]: AVC avc: denied { perfmon } for pid=4424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.393000 audit[4424]: AVC avc: denied { perfmon } for pid=4424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.393000 audit[4424]: AVC avc: denied { perfmon } for pid=4424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.393000 audit[4424]: AVC avc: denied { bpf } for pid=4424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.393000 audit[4424]: AVC avc: denied { bpf } for pid=4424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:34.393000 audit: BPF prog-id=151 op=LOAD Dec 13 14:15:34.393000 audit[4424]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4411 pid=4424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:34.393000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032633238653962393564333162393833623935313937313530633931 Dec 13 14:15:34.414153 env[1818]: time="2024-12-13T14:15:34.405643829Z" level=info msg="StopPodSandbox for \"9b54c2d2c7a66991a186af63a0fea2aaa4b9612969afd62fc0ef6c84e1feeea1\"" Dec 13 14:15:34.767312 systemd[1]: run-containerd-runc-k8s.io-02c28e9b95d31b983b95197150c917cfd0dbc61162162d79cbfb0f940d4a3759-runc.0w1L8s.mount: Deactivated successfully. Dec 13 14:15:34.774146 env[1818]: time="2024-12-13T14:15:34.774075133Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-8878db5b5-qh9tk,Uid:aa265595-980c-417f-a569-c324ec426ee4,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"02c28e9b95d31b983b95197150c917cfd0dbc61162162d79cbfb0f940d4a3759\"" Dec 13 14:15:34.779355 env[1818]: time="2024-12-13T14:15:34.779292709Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\"" Dec 13 14:15:34.791754 sshd[4385]: pam_unix(sshd:session): session closed for user core Dec 13 14:15:34.794000 audit[4385]: USER_END pid=4385 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:15:34.794000 audit[4385]: CRED_DISP pid=4385 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:15:34.798786 systemd[1]: sshd@7-172.31.18.231:22-139.178.89.65:51574.service: Deactivated successfully. Dec 13 14:15:34.797000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.31.18.231:22-139.178.89.65:51574 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:34.800338 systemd[1]: session-8.scope: Deactivated successfully. Dec 13 14:15:34.803103 systemd-logind[1810]: Session 8 logged out. Waiting for processes to exit. Dec 13 14:15:34.804931 systemd-logind[1810]: Removed session 8. Dec 13 14:15:34.826262 env[1818]: 2024-12-13 14:15:34.633 [INFO][4485] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="9b54c2d2c7a66991a186af63a0fea2aaa4b9612969afd62fc0ef6c84e1feeea1" Dec 13 14:15:34.826262 env[1818]: 2024-12-13 14:15:34.633 [INFO][4485] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="9b54c2d2c7a66991a186af63a0fea2aaa4b9612969afd62fc0ef6c84e1feeea1" iface="eth0" netns="/var/run/netns/cni-54a798ef-2866-a141-788c-c9f7c3d69748" Dec 13 14:15:34.826262 env[1818]: 2024-12-13 14:15:34.634 [INFO][4485] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="9b54c2d2c7a66991a186af63a0fea2aaa4b9612969afd62fc0ef6c84e1feeea1" iface="eth0" netns="/var/run/netns/cni-54a798ef-2866-a141-788c-c9f7c3d69748" Dec 13 14:15:34.826262 env[1818]: 2024-12-13 14:15:34.634 [INFO][4485] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="9b54c2d2c7a66991a186af63a0fea2aaa4b9612969afd62fc0ef6c84e1feeea1" iface="eth0" netns="/var/run/netns/cni-54a798ef-2866-a141-788c-c9f7c3d69748" Dec 13 14:15:34.826262 env[1818]: 2024-12-13 14:15:34.634 [INFO][4485] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="9b54c2d2c7a66991a186af63a0fea2aaa4b9612969afd62fc0ef6c84e1feeea1" Dec 13 14:15:34.826262 env[1818]: 2024-12-13 14:15:34.634 [INFO][4485] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="9b54c2d2c7a66991a186af63a0fea2aaa4b9612969afd62fc0ef6c84e1feeea1" Dec 13 14:15:34.826262 env[1818]: 2024-12-13 14:15:34.748 [INFO][4499] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="9b54c2d2c7a66991a186af63a0fea2aaa4b9612969afd62fc0ef6c84e1feeea1" HandleID="k8s-pod-network.9b54c2d2c7a66991a186af63a0fea2aaa4b9612969afd62fc0ef6c84e1feeea1" Workload="ip--172--31--18--231-k8s-coredns--76f75df574--5kblv-eth0" Dec 13 14:15:34.826262 env[1818]: 2024-12-13 14:15:34.749 [INFO][4499] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:15:34.826262 env[1818]: 2024-12-13 14:15:34.749 [INFO][4499] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:15:34.826262 env[1818]: 2024-12-13 14:15:34.777 [WARNING][4499] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="9b54c2d2c7a66991a186af63a0fea2aaa4b9612969afd62fc0ef6c84e1feeea1" HandleID="k8s-pod-network.9b54c2d2c7a66991a186af63a0fea2aaa4b9612969afd62fc0ef6c84e1feeea1" Workload="ip--172--31--18--231-k8s-coredns--76f75df574--5kblv-eth0" Dec 13 14:15:34.826262 env[1818]: 2024-12-13 14:15:34.812 [INFO][4499] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="9b54c2d2c7a66991a186af63a0fea2aaa4b9612969afd62fc0ef6c84e1feeea1" HandleID="k8s-pod-network.9b54c2d2c7a66991a186af63a0fea2aaa4b9612969afd62fc0ef6c84e1feeea1" Workload="ip--172--31--18--231-k8s-coredns--76f75df574--5kblv-eth0" Dec 13 14:15:34.826262 env[1818]: 2024-12-13 14:15:34.817 [INFO][4499] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:15:34.826262 env[1818]: 2024-12-13 14:15:34.823 [INFO][4485] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="9b54c2d2c7a66991a186af63a0fea2aaa4b9612969afd62fc0ef6c84e1feeea1" Dec 13 14:15:34.830850 systemd[1]: run-netns-cni\x2d54a798ef\x2d2866\x2da141\x2d788c\x2dc9f7c3d69748.mount: Deactivated successfully. Dec 13 14:15:34.832003 env[1818]: time="2024-12-13T14:15:34.831915630Z" level=info msg="TearDown network for sandbox \"9b54c2d2c7a66991a186af63a0fea2aaa4b9612969afd62fc0ef6c84e1feeea1\" successfully" Dec 13 14:15:34.832274 env[1818]: time="2024-12-13T14:15:34.832234898Z" level=info msg="StopPodSandbox for \"9b54c2d2c7a66991a186af63a0fea2aaa4b9612969afd62fc0ef6c84e1feeea1\" returns successfully" Dec 13 14:15:34.834405 env[1818]: time="2024-12-13T14:15:34.834356504Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-5kblv,Uid:ba6ec834-0540-4939-8d56-4186c0a4284f,Namespace:kube-system,Attempt:1,}" Dec 13 14:15:35.032000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.032000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.032000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.032000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.032000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.032000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.032000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.032000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.032000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.032000 audit: BPF prog-id=152 op=LOAD Dec 13 14:15:35.032000 audit[4463]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffd46fbb28 a2=40 a3=ffffd46fbb58 items=0 ppid=4258 pid=4463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:35.032000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:15:35.039000 audit: BPF prog-id=152 op=UNLOAD Dec 13 14:15:35.039000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.039000 audit[4463]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=ffffd46fbc40 a2=50 a3=0 items=0 ppid=4258 pid=4463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:35.039000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:15:35.057000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.057000 audit[4463]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffd46fbb98 a2=28 a3=ffffd46fbcc8 items=0 ppid=4258 pid=4463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:35.057000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:15:35.058000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.058000 audit[4463]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd46fbbc8 a2=28 a3=ffffd46fbcf8 items=0 ppid=4258 pid=4463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:35.058000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:15:35.058000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.058000 audit[4463]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd46fba78 a2=28 a3=ffffd46fbba8 items=0 ppid=4258 pid=4463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:35.058000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:15:35.058000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.058000 audit[4463]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffd46fbbe8 a2=28 a3=ffffd46fbd18 items=0 ppid=4258 pid=4463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:35.058000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:15:35.058000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.058000 audit[4463]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffd46fbbc8 a2=28 a3=ffffd46fbcf8 items=0 ppid=4258 pid=4463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:35.058000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:15:35.058000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.058000 audit[4463]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffd46fbbb8 a2=28 a3=ffffd46fbce8 items=0 ppid=4258 pid=4463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:35.058000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:15:35.058000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.058000 audit[4463]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffd46fbbe8 a2=28 a3=ffffd46fbd18 items=0 ppid=4258 pid=4463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:35.058000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:15:35.058000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.058000 audit[4463]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd46fbbc8 a2=28 a3=ffffd46fbcf8 items=0 ppid=4258 pid=4463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:35.058000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:15:35.058000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.058000 audit[4463]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd46fbbe8 a2=28 a3=ffffd46fbd18 items=0 ppid=4258 pid=4463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:35.058000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:15:35.058000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.058000 audit[4463]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd46fbbb8 a2=28 a3=ffffd46fbce8 items=0 ppid=4258 pid=4463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:35.058000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:15:35.058000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.058000 audit[4463]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffd46fbc38 a2=28 a3=ffffd46fbd78 items=0 ppid=4258 pid=4463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:35.058000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:15:35.059000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.059000 audit[4463]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffd46fb970 a2=50 a3=0 items=0 ppid=4258 pid=4463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:35.059000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:15:35.059000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.059000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.059000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.059000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.059000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.059000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.059000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.059000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.059000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.059000 audit: BPF prog-id=153 op=LOAD Dec 13 14:15:35.059000 audit[4463]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffd46fb978 a2=94 a3=5 items=0 ppid=4258 pid=4463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:35.059000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:15:35.059000 audit: BPF prog-id=153 op=UNLOAD Dec 13 14:15:35.059000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.059000 audit[4463]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffd46fba80 a2=50 a3=0 items=0 ppid=4258 pid=4463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:35.059000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:15:35.059000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.059000 audit[4463]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=16 a1=ffffd46fbbc8 a2=4 a3=3 items=0 ppid=4258 pid=4463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:35.059000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:15:35.060000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.060000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.060000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.060000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.060000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.060000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.060000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.060000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.060000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.060000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.060000 audit[4463]: AVC avc: denied { confidentiality } for pid=4463 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:15:35.060000 audit[4463]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffd46fbba8 a2=94 a3=6 items=0 ppid=4258 pid=4463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:35.060000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:15:35.060000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.060000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.060000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.060000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.060000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.060000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.060000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.060000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.060000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.060000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.060000 audit[4463]: AVC avc: denied { confidentiality } for pid=4463 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:15:35.060000 audit[4463]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffd46fb378 a2=94 a3=83 items=0 ppid=4258 pid=4463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:35.060000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:15:35.061000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.061000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.061000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.061000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.061000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.061000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.061000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.061000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.061000 audit[4463]: AVC avc: denied { perfmon } for pid=4463 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.061000 audit[4463]: AVC avc: denied { bpf } for pid=4463 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.061000 audit[4463]: AVC avc: denied { confidentiality } for pid=4463 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:15:35.061000 audit[4463]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffd46fb378 a2=94 a3=83 items=0 ppid=4258 pid=4463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:35.061000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:15:35.089000 audit[4531]: AVC avc: denied { bpf } for pid=4531 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.089000 audit[4531]: AVC avc: denied { bpf } for pid=4531 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.089000 audit[4531]: AVC avc: denied { perfmon } for pid=4531 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.089000 audit[4531]: AVC avc: denied { perfmon } for pid=4531 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.089000 audit[4531]: AVC avc: denied { perfmon } for pid=4531 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.089000 audit[4531]: AVC avc: denied { perfmon } for pid=4531 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.089000 audit[4531]: AVC avc: denied { perfmon } for pid=4531 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.089000 audit[4531]: AVC avc: denied { bpf } for pid=4531 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.089000 audit[4531]: AVC avc: denied { bpf } for pid=4531 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.089000 audit: BPF prog-id=154 op=LOAD Dec 13 14:15:35.089000 audit[4531]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffe0858408 a2=98 a3=ffffe08583f8 items=0 ppid=4258 pid=4531 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:35.089000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:15:35.090000 audit: BPF prog-id=154 op=UNLOAD Dec 13 14:15:35.090000 audit[4531]: AVC avc: denied { bpf } for pid=4531 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.090000 audit[4531]: AVC avc: denied { bpf } for pid=4531 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.090000 audit[4531]: AVC avc: denied { perfmon } for pid=4531 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.090000 audit[4531]: AVC avc: denied { perfmon } for pid=4531 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.090000 audit[4531]: AVC avc: denied { perfmon } for pid=4531 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.090000 audit[4531]: AVC avc: denied { perfmon } for pid=4531 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.090000 audit[4531]: AVC avc: denied { perfmon } for pid=4531 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.090000 audit[4531]: AVC avc: denied { bpf } for pid=4531 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.090000 audit[4531]: AVC avc: denied { bpf } for pid=4531 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.090000 audit: BPF prog-id=155 op=LOAD Dec 13 14:15:35.090000 audit[4531]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffe08582b8 a2=74 a3=95 items=0 ppid=4258 pid=4531 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:35.090000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:15:35.090000 audit: BPF prog-id=155 op=UNLOAD Dec 13 14:15:35.090000 audit[4531]: AVC avc: denied { bpf } for pid=4531 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.090000 audit[4531]: AVC avc: denied { bpf } for pid=4531 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.090000 audit[4531]: AVC avc: denied { perfmon } for pid=4531 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.090000 audit[4531]: AVC avc: denied { perfmon } for pid=4531 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.090000 audit[4531]: AVC avc: denied { perfmon } for pid=4531 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.090000 audit[4531]: AVC avc: denied { perfmon } for pid=4531 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.090000 audit[4531]: AVC avc: denied { perfmon } for pid=4531 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.090000 audit[4531]: AVC avc: denied { bpf } for pid=4531 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.090000 audit[4531]: AVC avc: denied { bpf } for pid=4531 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.090000 audit: BPF prog-id=156 op=LOAD Dec 13 14:15:35.090000 audit[4531]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffe08582e8 a2=40 a3=ffffe0858318 items=0 ppid=4258 pid=4531 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:35.090000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:15:35.090000 audit: BPF prog-id=156 op=UNLOAD Dec 13 14:15:35.164748 (udev-worker)[4181]: Network interface NamePolicy= disabled on kernel command line. Dec 13 14:15:35.171807 systemd-networkd[1540]: cali0e8cf072f73: Link UP Dec 13 14:15:35.177278 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:15:35.177502 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali0e8cf072f73: link becomes ready Dec 13 14:15:35.177702 systemd-networkd[1540]: cali0e8cf072f73: Gained carrier Dec 13 14:15:35.207907 env[1818]: 2024-12-13 14:15:34.986 [INFO][4512] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--18--231-k8s-coredns--76f75df574--5kblv-eth0 coredns-76f75df574- kube-system ba6ec834-0540-4939-8d56-4186c0a4284f 839 0 2024-12-13 14:14:55 +0000 UTC map[k8s-app:kube-dns pod-template-hash:76f75df574 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ip-172-31-18-231 coredns-76f75df574-5kblv eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali0e8cf072f73 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="ae29b51d2f87ad87acb7b012aa06bb63cec4ef491d7581504a85cbc41b16c62b" Namespace="kube-system" Pod="coredns-76f75df574-5kblv" WorkloadEndpoint="ip--172--31--18--231-k8s-coredns--76f75df574--5kblv-" Dec 13 14:15:35.207907 env[1818]: 2024-12-13 14:15:34.987 [INFO][4512] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="ae29b51d2f87ad87acb7b012aa06bb63cec4ef491d7581504a85cbc41b16c62b" Namespace="kube-system" Pod="coredns-76f75df574-5kblv" WorkloadEndpoint="ip--172--31--18--231-k8s-coredns--76f75df574--5kblv-eth0" Dec 13 14:15:35.207907 env[1818]: 2024-12-13 14:15:35.058 [INFO][4522] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="ae29b51d2f87ad87acb7b012aa06bb63cec4ef491d7581504a85cbc41b16c62b" HandleID="k8s-pod-network.ae29b51d2f87ad87acb7b012aa06bb63cec4ef491d7581504a85cbc41b16c62b" Workload="ip--172--31--18--231-k8s-coredns--76f75df574--5kblv-eth0" Dec 13 14:15:35.207907 env[1818]: 2024-12-13 14:15:35.085 [INFO][4522] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="ae29b51d2f87ad87acb7b012aa06bb63cec4ef491d7581504a85cbc41b16c62b" HandleID="k8s-pod-network.ae29b51d2f87ad87acb7b012aa06bb63cec4ef491d7581504a85cbc41b16c62b" Workload="ip--172--31--18--231-k8s-coredns--76f75df574--5kblv-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000317c30), Attrs:map[string]string{"namespace":"kube-system", "node":"ip-172-31-18-231", "pod":"coredns-76f75df574-5kblv", "timestamp":"2024-12-13 14:15:35.058734127 +0000 UTC"}, Hostname:"ip-172-31-18-231", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:15:35.207907 env[1818]: 2024-12-13 14:15:35.086 [INFO][4522] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:15:35.207907 env[1818]: 2024-12-13 14:15:35.086 [INFO][4522] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:15:35.207907 env[1818]: 2024-12-13 14:15:35.087 [INFO][4522] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-18-231' Dec 13 14:15:35.207907 env[1818]: 2024-12-13 14:15:35.095 [INFO][4522] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.ae29b51d2f87ad87acb7b012aa06bb63cec4ef491d7581504a85cbc41b16c62b" host="ip-172-31-18-231" Dec 13 14:15:35.207907 env[1818]: 2024-12-13 14:15:35.106 [INFO][4522] ipam/ipam.go 372: Looking up existing affinities for host host="ip-172-31-18-231" Dec 13 14:15:35.207907 env[1818]: 2024-12-13 14:15:35.116 [INFO][4522] ipam/ipam.go 489: Trying affinity for 192.168.34.128/26 host="ip-172-31-18-231" Dec 13 14:15:35.207907 env[1818]: 2024-12-13 14:15:35.120 [INFO][4522] ipam/ipam.go 155: Attempting to load block cidr=192.168.34.128/26 host="ip-172-31-18-231" Dec 13 14:15:35.207907 env[1818]: 2024-12-13 14:15:35.126 [INFO][4522] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.34.128/26 host="ip-172-31-18-231" Dec 13 14:15:35.207907 env[1818]: 2024-12-13 14:15:35.126 [INFO][4522] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.34.128/26 handle="k8s-pod-network.ae29b51d2f87ad87acb7b012aa06bb63cec4ef491d7581504a85cbc41b16c62b" host="ip-172-31-18-231" Dec 13 14:15:35.207907 env[1818]: 2024-12-13 14:15:35.129 [INFO][4522] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.ae29b51d2f87ad87acb7b012aa06bb63cec4ef491d7581504a85cbc41b16c62b Dec 13 14:15:35.207907 env[1818]: 2024-12-13 14:15:35.139 [INFO][4522] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.34.128/26 handle="k8s-pod-network.ae29b51d2f87ad87acb7b012aa06bb63cec4ef491d7581504a85cbc41b16c62b" host="ip-172-31-18-231" Dec 13 14:15:35.207907 env[1818]: 2024-12-13 14:15:35.151 [INFO][4522] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.34.130/26] block=192.168.34.128/26 handle="k8s-pod-network.ae29b51d2f87ad87acb7b012aa06bb63cec4ef491d7581504a85cbc41b16c62b" host="ip-172-31-18-231" Dec 13 14:15:35.207907 env[1818]: 2024-12-13 14:15:35.152 [INFO][4522] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.34.130/26] handle="k8s-pod-network.ae29b51d2f87ad87acb7b012aa06bb63cec4ef491d7581504a85cbc41b16c62b" host="ip-172-31-18-231" Dec 13 14:15:35.207907 env[1818]: 2024-12-13 14:15:35.152 [INFO][4522] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:15:35.207907 env[1818]: 2024-12-13 14:15:35.152 [INFO][4522] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.34.130/26] IPv6=[] ContainerID="ae29b51d2f87ad87acb7b012aa06bb63cec4ef491d7581504a85cbc41b16c62b" HandleID="k8s-pod-network.ae29b51d2f87ad87acb7b012aa06bb63cec4ef491d7581504a85cbc41b16c62b" Workload="ip--172--31--18--231-k8s-coredns--76f75df574--5kblv-eth0" Dec 13 14:15:35.209333 env[1818]: 2024-12-13 14:15:35.154 [INFO][4512] cni-plugin/k8s.go 386: Populated endpoint ContainerID="ae29b51d2f87ad87acb7b012aa06bb63cec4ef491d7581504a85cbc41b16c62b" Namespace="kube-system" Pod="coredns-76f75df574-5kblv" WorkloadEndpoint="ip--172--31--18--231-k8s-coredns--76f75df574--5kblv-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--18--231-k8s-coredns--76f75df574--5kblv-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"ba6ec834-0540-4939-8d56-4186c0a4284f", ResourceVersion:"839", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 14, 55, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-18-231", ContainerID:"", Pod:"coredns-76f75df574-5kblv", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.34.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali0e8cf072f73", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:15:35.209333 env[1818]: 2024-12-13 14:15:35.155 [INFO][4512] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.34.130/32] ContainerID="ae29b51d2f87ad87acb7b012aa06bb63cec4ef491d7581504a85cbc41b16c62b" Namespace="kube-system" Pod="coredns-76f75df574-5kblv" WorkloadEndpoint="ip--172--31--18--231-k8s-coredns--76f75df574--5kblv-eth0" Dec 13 14:15:35.209333 env[1818]: 2024-12-13 14:15:35.155 [INFO][4512] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali0e8cf072f73 ContainerID="ae29b51d2f87ad87acb7b012aa06bb63cec4ef491d7581504a85cbc41b16c62b" Namespace="kube-system" Pod="coredns-76f75df574-5kblv" WorkloadEndpoint="ip--172--31--18--231-k8s-coredns--76f75df574--5kblv-eth0" Dec 13 14:15:35.209333 env[1818]: 2024-12-13 14:15:35.179 [INFO][4512] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="ae29b51d2f87ad87acb7b012aa06bb63cec4ef491d7581504a85cbc41b16c62b" Namespace="kube-system" Pod="coredns-76f75df574-5kblv" WorkloadEndpoint="ip--172--31--18--231-k8s-coredns--76f75df574--5kblv-eth0" Dec 13 14:15:35.209333 env[1818]: 2024-12-13 14:15:35.179 [INFO][4512] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="ae29b51d2f87ad87acb7b012aa06bb63cec4ef491d7581504a85cbc41b16c62b" Namespace="kube-system" Pod="coredns-76f75df574-5kblv" WorkloadEndpoint="ip--172--31--18--231-k8s-coredns--76f75df574--5kblv-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--18--231-k8s-coredns--76f75df574--5kblv-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"ba6ec834-0540-4939-8d56-4186c0a4284f", ResourceVersion:"839", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 14, 55, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-18-231", ContainerID:"ae29b51d2f87ad87acb7b012aa06bb63cec4ef491d7581504a85cbc41b16c62b", Pod:"coredns-76f75df574-5kblv", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.34.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali0e8cf072f73", MAC:"1e:fa:4c:ea:14:89", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:15:35.209333 env[1818]: 2024-12-13 14:15:35.204 [INFO][4512] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="ae29b51d2f87ad87acb7b012aa06bb63cec4ef491d7581504a85cbc41b16c62b" Namespace="kube-system" Pod="coredns-76f75df574-5kblv" WorkloadEndpoint="ip--172--31--18--231-k8s-coredns--76f75df574--5kblv-eth0" Dec 13 14:15:35.241269 env[1818]: time="2024-12-13T14:15:35.240820380Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:15:35.241269 env[1818]: time="2024-12-13T14:15:35.240903578Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:15:35.241269 env[1818]: time="2024-12-13T14:15:35.240929763Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:15:35.255154 env[1818]: time="2024-12-13T14:15:35.241715219Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ae29b51d2f87ad87acb7b012aa06bb63cec4ef491d7581504a85cbc41b16c62b pid=4562 runtime=io.containerd.runc.v2 Dec 13 14:15:35.282595 systemd[1]: Started cri-containerd-ae29b51d2f87ad87acb7b012aa06bb63cec4ef491d7581504a85cbc41b16c62b.scope. Dec 13 14:15:35.351000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.351000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.351000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.351000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.351000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.351000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.351000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.351000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.351000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.352000 audit: BPF prog-id=157 op=LOAD Dec 13 14:15:35.353000 audit[4572]: AVC avc: denied { bpf } for pid=4572 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.353000 audit[4572]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4562 pid=4572 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:35.353000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165323962353164326638376164383761636237623031326161303662 Dec 13 14:15:35.354000 audit[4572]: AVC avc: denied { perfmon } for pid=4572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.354000 audit[4572]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4562 pid=4572 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:35.354000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165323962353164326638376164383761636237623031326161303662 Dec 13 14:15:35.354000 audit[4572]: AVC avc: denied { bpf } for pid=4572 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.354000 audit[4572]: AVC avc: denied { bpf } for pid=4572 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.354000 audit[4572]: AVC avc: denied { bpf } for pid=4572 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.354000 audit[4572]: AVC avc: denied { perfmon } for pid=4572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.354000 audit[4572]: AVC avc: denied { perfmon } for pid=4572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.354000 audit[4572]: AVC avc: denied { perfmon } for pid=4572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.354000 audit[4572]: AVC avc: denied { perfmon } for pid=4572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.354000 audit[4572]: AVC avc: denied { perfmon } for pid=4572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.354000 audit[4572]: AVC avc: denied { bpf } for pid=4572 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.354000 audit[4572]: AVC avc: denied { bpf } for pid=4572 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.354000 audit: BPF prog-id=158 op=LOAD Dec 13 14:15:35.354000 audit[4572]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4562 pid=4572 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:35.354000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165323962353164326638376164383761636237623031326161303662 Dec 13 14:15:35.356000 audit[4572]: AVC avc: denied { bpf } for pid=4572 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.356000 audit[4572]: AVC avc: denied { bpf } for pid=4572 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.356000 audit[4572]: AVC avc: denied { perfmon } for pid=4572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.356000 audit[4572]: AVC avc: denied { perfmon } for pid=4572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.356000 audit[4572]: AVC avc: denied { perfmon } for pid=4572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.356000 audit[4572]: AVC avc: denied { perfmon } for pid=4572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.356000 audit[4572]: AVC avc: denied { perfmon } for pid=4572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.356000 audit[4572]: AVC avc: denied { bpf } for pid=4572 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.356000 audit[4572]: AVC avc: denied { bpf } for pid=4572 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.356000 audit: BPF prog-id=159 op=LOAD Dec 13 14:15:35.356000 audit[4572]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4562 pid=4572 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:35.356000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165323962353164326638376164383761636237623031326161303662 Dec 13 14:15:35.357000 audit: BPF prog-id=159 op=UNLOAD Dec 13 14:15:35.357000 audit: BPF prog-id=158 op=UNLOAD Dec 13 14:15:35.357000 audit[4572]: AVC avc: denied { bpf } for pid=4572 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.357000 audit[4572]: AVC avc: denied { bpf } for pid=4572 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.357000 audit[4572]: AVC avc: denied { bpf } for pid=4572 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.357000 audit[4572]: AVC avc: denied { perfmon } for pid=4572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.357000 audit[4572]: AVC avc: denied { perfmon } for pid=4572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.357000 audit[4572]: AVC avc: denied { perfmon } for pid=4572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.357000 audit[4572]: AVC avc: denied { perfmon } for pid=4572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.357000 audit[4572]: AVC avc: denied { perfmon } for pid=4572 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.357000 audit[4572]: AVC avc: denied { bpf } for pid=4572 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.357000 audit[4572]: AVC avc: denied { bpf } for pid=4572 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.357000 audit: BPF prog-id=160 op=LOAD Dec 13 14:15:35.357000 audit[4572]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4562 pid=4572 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:35.357000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165323962353164326638376164383761636237623031326161303662 Dec 13 14:15:35.365543 systemd-networkd[1540]: vxlan.calico: Link UP Dec 13 14:15:35.365552 systemd-networkd[1540]: vxlan.calico: Gained carrier Dec 13 14:15:35.430000 audit[4613]: AVC avc: denied { bpf } for pid=4613 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.430000 audit[4613]: AVC avc: denied { bpf } for pid=4613 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.430000 audit[4613]: AVC avc: denied { perfmon } for pid=4613 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.430000 audit[4613]: AVC avc: denied { perfmon } for pid=4613 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.430000 audit[4613]: AVC avc: denied { perfmon } for pid=4613 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.430000 audit[4613]: AVC avc: denied { perfmon } for pid=4613 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.430000 audit[4613]: AVC avc: denied { perfmon } for pid=4613 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.430000 audit[4613]: AVC avc: denied { bpf } for pid=4613 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.430000 audit[4613]: AVC avc: denied { bpf } for pid=4613 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.430000 audit: BPF prog-id=161 op=LOAD Dec 13 14:15:35.430000 audit[4613]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffd7247478 a2=98 a3=ffffd7247468 items=0 ppid=4258 pid=4613 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:35.430000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:15:35.431000 audit: BPF prog-id=161 op=UNLOAD Dec 13 14:15:35.431000 audit[4613]: AVC avc: denied { bpf } for pid=4613 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.431000 audit[4613]: AVC avc: denied { bpf } for pid=4613 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.431000 audit[4613]: AVC avc: denied { perfmon } for pid=4613 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.431000 audit[4613]: AVC avc: denied { perfmon } for pid=4613 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.431000 audit[4613]: AVC avc: denied { perfmon } for pid=4613 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.431000 audit[4613]: AVC avc: denied { perfmon } for pid=4613 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.431000 audit[4613]: AVC avc: denied { perfmon } for pid=4613 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.431000 audit[4613]: AVC avc: denied { bpf } for pid=4613 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.431000 audit[4613]: AVC avc: denied { bpf } for pid=4613 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.431000 audit: BPF prog-id=162 op=LOAD Dec 13 14:15:35.431000 audit[4613]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffd7247158 a2=74 a3=95 items=0 ppid=4258 pid=4613 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:35.431000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:15:35.431000 audit: BPF prog-id=162 op=UNLOAD Dec 13 14:15:35.431000 audit[4613]: AVC avc: denied { bpf } for pid=4613 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.431000 audit[4613]: AVC avc: denied { bpf } for pid=4613 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.431000 audit[4613]: AVC avc: denied { perfmon } for pid=4613 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.431000 audit[4613]: AVC avc: denied { perfmon } for pid=4613 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.431000 audit[4613]: AVC avc: denied { perfmon } for pid=4613 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.431000 audit[4613]: AVC avc: denied { perfmon } for pid=4613 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.431000 audit[4613]: AVC avc: denied { perfmon } for pid=4613 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.431000 audit[4613]: AVC avc: denied { bpf } for pid=4613 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.431000 audit[4613]: AVC avc: denied { bpf } for pid=4613 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.431000 audit: BPF prog-id=163 op=LOAD Dec 13 14:15:35.431000 audit[4613]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffd72471b8 a2=94 a3=2 items=0 ppid=4258 pid=4613 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:35.431000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:15:35.431000 audit: BPF prog-id=163 op=UNLOAD Dec 13 14:15:35.431000 audit[4613]: AVC avc: denied { bpf } for pid=4613 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.431000 audit[4613]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffd72471e8 a2=28 a3=ffffd7247318 items=0 ppid=4258 pid=4613 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:35.431000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:15:35.431000 audit[4613]: AVC avc: denied { bpf } for pid=4613 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.431000 audit[4613]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd7247218 a2=28 a3=ffffd7247348 items=0 ppid=4258 pid=4613 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:35.431000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:15:35.431000 audit[4613]: AVC avc: denied { bpf } for pid=4613 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.431000 audit[4613]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd72470c8 a2=28 a3=ffffd72471f8 items=0 ppid=4258 pid=4613 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:35.431000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:15:35.431000 audit[4613]: AVC avc: denied { bpf } for pid=4613 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.431000 audit[4613]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffd7247238 a2=28 a3=ffffd7247368 items=0 ppid=4258 pid=4613 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:35.431000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:15:35.431000 audit[4613]: AVC avc: denied { bpf } for pid=4613 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.431000 audit[4613]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffd7247218 a2=28 a3=ffffd7247348 items=0 ppid=4258 pid=4613 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:35.431000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:15:35.431000 audit[4613]: AVC avc: denied { bpf } for pid=4613 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.431000 audit[4613]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffd7247208 a2=28 a3=ffffd7247338 items=0 ppid=4258 pid=4613 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:35.431000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:15:35.431000 audit[4613]: AVC avc: denied { bpf } for pid=4613 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.431000 audit[4613]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffd7247238 a2=28 a3=ffffd7247368 items=0 ppid=4258 pid=4613 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:35.431000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:15:35.431000 audit[4613]: AVC avc: denied { bpf } for pid=4613 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.431000 audit[4613]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd7247218 a2=28 a3=ffffd7247348 items=0 ppid=4258 pid=4613 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:35.431000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:15:35.431000 audit[4613]: AVC avc: denied { bpf } for pid=4613 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.431000 audit[4613]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd7247238 a2=28 a3=ffffd7247368 items=0 ppid=4258 pid=4613 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:35.431000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:15:35.431000 audit[4613]: AVC avc: denied { bpf } for pid=4613 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.431000 audit[4613]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd7247208 a2=28 a3=ffffd7247338 items=0 ppid=4258 pid=4613 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:35.431000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:15:35.431000 audit[4613]: AVC avc: denied { bpf } for pid=4613 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.431000 audit[4613]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffd7247288 a2=28 a3=ffffd72473c8 items=0 ppid=4258 pid=4613 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:35.431000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:15:35.432000 audit[4613]: AVC avc: denied { bpf } for pid=4613 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.432000 audit[4613]: AVC avc: denied { bpf } for pid=4613 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.432000 audit[4613]: AVC avc: denied { perfmon } for pid=4613 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.432000 audit[4613]: AVC avc: denied { perfmon } for pid=4613 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.432000 audit[4613]: AVC avc: denied { perfmon } for pid=4613 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.432000 audit[4613]: AVC avc: denied { perfmon } for pid=4613 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.432000 audit[4613]: AVC avc: denied { perfmon } for pid=4613 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.432000 audit[4613]: AVC avc: denied { bpf } for pid=4613 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.432000 audit[4613]: AVC avc: denied { bpf } for pid=4613 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.432000 audit: BPF prog-id=164 op=LOAD Dec 13 14:15:35.432000 audit[4613]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffd72470a8 a2=40 a3=ffffd72470d8 items=0 ppid=4258 pid=4613 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:35.432000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:15:35.432000 audit: BPF prog-id=164 op=UNLOAD Dec 13 14:15:35.432000 audit[4613]: AVC avc: denied { bpf } for pid=4613 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.432000 audit[4613]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=0 a1=ffffd72470d0 a2=50 a3=0 items=0 ppid=4258 pid=4613 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:35.432000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:15:35.432000 audit[4613]: AVC avc: denied { bpf } for pid=4613 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.432000 audit[4613]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=0 a1=ffffd72470d0 a2=50 a3=0 items=0 ppid=4258 pid=4613 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:35.432000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:15:35.433000 audit[4613]: AVC avc: denied { bpf } for pid=4613 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.433000 audit[4613]: AVC avc: denied { bpf } for pid=4613 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.433000 audit[4613]: AVC avc: denied { bpf } for pid=4613 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.433000 audit[4613]: AVC avc: denied { perfmon } for pid=4613 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.433000 audit[4613]: AVC avc: denied { perfmon } for pid=4613 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.433000 audit[4613]: AVC avc: denied { perfmon } for pid=4613 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.433000 audit[4613]: AVC avc: denied { perfmon } for pid=4613 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.433000 audit[4613]: AVC avc: denied { perfmon } for pid=4613 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.433000 audit[4613]: AVC avc: denied { bpf } for pid=4613 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.433000 audit[4613]: AVC avc: denied { bpf } for pid=4613 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.433000 audit: BPF prog-id=165 op=LOAD Dec 13 14:15:35.433000 audit[4613]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffd7246838 a2=94 a3=2 items=0 ppid=4258 pid=4613 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:35.433000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:15:35.433000 audit: BPF prog-id=165 op=UNLOAD Dec 13 14:15:35.433000 audit[4613]: AVC avc: denied { bpf } for pid=4613 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.433000 audit[4613]: AVC avc: denied { bpf } for pid=4613 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.433000 audit[4613]: AVC avc: denied { bpf } for pid=4613 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.433000 audit[4613]: AVC avc: denied { perfmon } for pid=4613 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.433000 audit[4613]: AVC avc: denied { perfmon } for pid=4613 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.433000 audit[4613]: AVC avc: denied { perfmon } for pid=4613 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.433000 audit[4613]: AVC avc: denied { perfmon } for pid=4613 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.433000 audit[4613]: AVC avc: denied { perfmon } for pid=4613 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.433000 audit[4613]: AVC avc: denied { bpf } for pid=4613 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.433000 audit[4613]: AVC avc: denied { bpf } for pid=4613 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.433000 audit: BPF prog-id=166 op=LOAD Dec 13 14:15:35.433000 audit[4613]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffd72469c8 a2=94 a3=2d items=0 ppid=4258 pid=4613 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:35.433000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:15:35.450000 audit[4615]: AVC avc: denied { bpf } for pid=4615 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.450000 audit[4615]: AVC avc: denied { bpf } for pid=4615 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.450000 audit[4615]: AVC avc: denied { perfmon } for pid=4615 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.450000 audit[4615]: AVC avc: denied { perfmon } for pid=4615 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.450000 audit[4615]: AVC avc: denied { perfmon } for pid=4615 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.450000 audit[4615]: AVC avc: denied { perfmon } for pid=4615 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.450000 audit[4615]: AVC avc: denied { perfmon } for pid=4615 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.450000 audit[4615]: AVC avc: denied { bpf } for pid=4615 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.450000 audit[4615]: AVC avc: denied { bpf } for pid=4615 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.450000 audit: BPF prog-id=167 op=LOAD Dec 13 14:15:35.450000 audit[4615]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffda622b48 a2=98 a3=ffffda622b38 items=0 ppid=4258 pid=4615 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:35.450000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:15:35.450000 audit: BPF prog-id=167 op=UNLOAD Dec 13 14:15:35.450000 audit[4615]: AVC avc: denied { bpf } for pid=4615 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.450000 audit[4615]: AVC avc: denied { bpf } for pid=4615 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.450000 audit[4615]: AVC avc: denied { perfmon } for pid=4615 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.450000 audit[4615]: AVC avc: denied { perfmon } for pid=4615 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.450000 audit[4615]: AVC avc: denied { perfmon } for pid=4615 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.450000 audit[4615]: AVC avc: denied { perfmon } for pid=4615 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.450000 audit[4615]: AVC avc: denied { perfmon } for pid=4615 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.450000 audit[4615]: AVC avc: denied { bpf } for pid=4615 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.450000 audit[4615]: AVC avc: denied { bpf } for pid=4615 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.450000 audit: BPF prog-id=168 op=LOAD Dec 13 14:15:35.450000 audit[4615]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffda6227d8 a2=74 a3=95 items=0 ppid=4258 pid=4615 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:35.450000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:15:35.451000 audit: BPF prog-id=168 op=UNLOAD Dec 13 14:15:35.451000 audit[4615]: AVC avc: denied { bpf } for pid=4615 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.451000 audit[4615]: AVC avc: denied { bpf } for pid=4615 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.451000 audit[4615]: AVC avc: denied { perfmon } for pid=4615 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.451000 audit[4615]: AVC avc: denied { perfmon } for pid=4615 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.451000 audit[4615]: AVC avc: denied { perfmon } for pid=4615 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.451000 audit[4615]: AVC avc: denied { perfmon } for pid=4615 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.451000 audit[4615]: AVC avc: denied { perfmon } for pid=4615 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.451000 audit[4615]: AVC avc: denied { bpf } for pid=4615 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.451000 audit[4615]: AVC avc: denied { bpf } for pid=4615 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.451000 audit: BPF prog-id=169 op=LOAD Dec 13 14:15:35.451000 audit[4615]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffda622838 a2=94 a3=2 items=0 ppid=4258 pid=4615 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:35.451000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:15:35.451000 audit: BPF prog-id=169 op=UNLOAD Dec 13 14:15:35.482892 env[1818]: time="2024-12-13T14:15:35.448671838Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-5kblv,Uid:ba6ec834-0540-4939-8d56-4186c0a4284f,Namespace:kube-system,Attempt:1,} returns sandbox id \"ae29b51d2f87ad87acb7b012aa06bb63cec4ef491d7581504a85cbc41b16c62b\"" Dec 13 14:15:35.482892 env[1818]: time="2024-12-13T14:15:35.458115857Z" level=info msg="CreateContainer within sandbox \"ae29b51d2f87ad87acb7b012aa06bb63cec4ef491d7581504a85cbc41b16c62b\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Dec 13 14:15:35.503594 env[1818]: time="2024-12-13T14:15:35.503517822Z" level=info msg="CreateContainer within sandbox \"ae29b51d2f87ad87acb7b012aa06bb63cec4ef491d7581504a85cbc41b16c62b\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"f21eb4c748e0e9d4242ebb2ddbeaeb5ed5829c31d3993bee43866518f448fbb5\"" Dec 13 14:15:35.504493 env[1818]: time="2024-12-13T14:15:35.504412037Z" level=info msg="StartContainer for \"f21eb4c748e0e9d4242ebb2ddbeaeb5ed5829c31d3993bee43866518f448fbb5\"" Dec 13 14:15:35.548884 systemd[1]: Started cri-containerd-f21eb4c748e0e9d4242ebb2ddbeaeb5ed5829c31d3993bee43866518f448fbb5.scope. Dec 13 14:15:35.605000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.606000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.606000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.606000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.607000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.607000 audit: BPF prog-id=170 op=LOAD Dec 13 14:15:35.608000 audit[4627]: AVC avc: denied { bpf } for pid=4627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.608000 audit[4627]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001c5b38 a2=10 a3=0 items=0 ppid=4562 pid=4627 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:35.608000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632316562346337343865306539643432343265626232646462656165 Dec 13 14:15:35.608000 audit[4627]: AVC avc: denied { perfmon } for pid=4627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.608000 audit[4627]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001c55a0 a2=3c a3=0 items=0 ppid=4562 pid=4627 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:35.608000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632316562346337343865306539643432343265626232646462656165 Dec 13 14:15:35.609000 audit[4627]: AVC avc: denied { bpf } for pid=4627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.609000 audit[4627]: AVC avc: denied { bpf } for pid=4627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.609000 audit[4627]: AVC avc: denied { bpf } for pid=4627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.609000 audit[4627]: AVC avc: denied { perfmon } for pid=4627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.609000 audit[4627]: AVC avc: denied { perfmon } for pid=4627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.609000 audit[4627]: AVC avc: denied { perfmon } for pid=4627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.609000 audit[4627]: AVC avc: denied { perfmon } for pid=4627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.609000 audit[4627]: AVC avc: denied { perfmon } for pid=4627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.609000 audit[4627]: AVC avc: denied { bpf } for pid=4627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.609000 audit[4627]: AVC avc: denied { bpf } for pid=4627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.609000 audit: BPF prog-id=171 op=LOAD Dec 13 14:15:35.609000 audit[4627]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c58e0 a2=78 a3=0 items=0 ppid=4562 pid=4627 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:35.609000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632316562346337343865306539643432343265626232646462656165 Dec 13 14:15:35.610000 audit[4627]: AVC avc: denied { bpf } for pid=4627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.610000 audit[4627]: AVC avc: denied { bpf } for pid=4627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.610000 audit[4627]: AVC avc: denied { perfmon } for pid=4627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.610000 audit[4627]: AVC avc: denied { perfmon } for pid=4627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.610000 audit[4627]: AVC avc: denied { perfmon } for pid=4627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.610000 audit[4627]: AVC avc: denied { perfmon } for pid=4627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.610000 audit[4627]: AVC avc: denied { perfmon } for pid=4627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.610000 audit[4627]: AVC avc: denied { bpf } for pid=4627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.610000 audit[4627]: AVC avc: denied { bpf } for pid=4627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.610000 audit: BPF prog-id=172 op=LOAD Dec 13 14:15:35.610000 audit[4627]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001c5670 a2=78 a3=0 items=0 ppid=4562 pid=4627 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:35.610000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632316562346337343865306539643432343265626232646462656165 Dec 13 14:15:35.611000 audit: BPF prog-id=172 op=UNLOAD Dec 13 14:15:35.611000 audit: BPF prog-id=171 op=UNLOAD Dec 13 14:15:35.612000 audit[4627]: AVC avc: denied { bpf } for pid=4627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.612000 audit[4627]: AVC avc: denied { bpf } for pid=4627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.612000 audit[4627]: AVC avc: denied { bpf } for pid=4627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.612000 audit[4627]: AVC avc: denied { perfmon } for pid=4627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.612000 audit[4627]: AVC avc: denied { perfmon } for pid=4627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.612000 audit[4627]: AVC avc: denied { perfmon } for pid=4627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.612000 audit[4627]: AVC avc: denied { perfmon } for pid=4627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.612000 audit[4627]: AVC avc: denied { perfmon } for pid=4627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.612000 audit[4627]: AVC avc: denied { bpf } for pid=4627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.612000 audit[4627]: AVC avc: denied { bpf } for pid=4627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.612000 audit: BPF prog-id=173 op=LOAD Dec 13 14:15:35.612000 audit[4627]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c5b40 a2=78 a3=0 items=0 ppid=4562 pid=4627 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:35.612000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632316562346337343865306539643432343265626232646462656165 Dec 13 14:15:35.644869 env[1818]: time="2024-12-13T14:15:35.644776648Z" level=info msg="StartContainer for \"f21eb4c748e0e9d4242ebb2ddbeaeb5ed5829c31d3993bee43866518f448fbb5\" returns successfully" Dec 13 14:15:35.758667 systemd-networkd[1540]: calic154195ee2a: Gained IPv6LL Dec 13 14:15:35.793000 audit[4658]: NETFILTER_CFG table=filter:99 family=2 entries=16 op=nft_register_rule pid=4658 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:15:35.793000 audit[4658]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5908 a0=3 a1=ffffe2df9ec0 a2=0 a3=1 items=0 ppid=3199 pid=4658 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:35.793000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:15:35.802000 audit[4658]: NETFILTER_CFG table=nat:100 family=2 entries=14 op=nft_register_rule pid=4658 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:15:35.802000 audit[4658]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3468 a0=3 a1=ffffe2df9ec0 a2=0 a3=1 items=0 ppid=3199 pid=4658 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:35.802000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:15:35.929000 audit[4615]: AVC avc: denied { bpf } for pid=4615 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.929000 audit[4615]: AVC avc: denied { bpf } for pid=4615 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.929000 audit[4615]: AVC avc: denied { perfmon } for pid=4615 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.929000 audit[4615]: AVC avc: denied { perfmon } for pid=4615 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.929000 audit[4615]: AVC avc: denied { perfmon } for pid=4615 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.929000 audit[4615]: AVC avc: denied { perfmon } for pid=4615 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.929000 audit[4615]: AVC avc: denied { perfmon } for pid=4615 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.929000 audit[4615]: AVC avc: denied { bpf } for pid=4615 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.929000 audit[4615]: AVC avc: denied { bpf } for pid=4615 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.929000 audit: BPF prog-id=174 op=LOAD Dec 13 14:15:35.929000 audit[4615]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffda6227f8 a2=40 a3=ffffda622828 items=0 ppid=4258 pid=4615 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:35.929000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:15:35.930000 audit: BPF prog-id=174 op=UNLOAD Dec 13 14:15:35.930000 audit[4615]: AVC avc: denied { perfmon } for pid=4615 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.930000 audit[4615]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=ffffda622910 a2=50 a3=0 items=0 ppid=4258 pid=4615 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:35.930000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:15:35.948000 audit[4615]: AVC avc: denied { bpf } for pid=4615 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.948000 audit[4615]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffda622868 a2=28 a3=ffffda622998 items=0 ppid=4258 pid=4615 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:35.948000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:15:35.948000 audit[4615]: AVC avc: denied { bpf } for pid=4615 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.948000 audit[4615]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffda622898 a2=28 a3=ffffda6229c8 items=0 ppid=4258 pid=4615 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:35.948000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:15:35.948000 audit[4615]: AVC avc: denied { bpf } for pid=4615 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.948000 audit[4615]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffda622748 a2=28 a3=ffffda622878 items=0 ppid=4258 pid=4615 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:35.948000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:15:35.948000 audit[4615]: AVC avc: denied { bpf } for pid=4615 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.948000 audit[4615]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffda6228b8 a2=28 a3=ffffda6229e8 items=0 ppid=4258 pid=4615 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:35.948000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:15:35.948000 audit[4615]: AVC avc: denied { bpf } for pid=4615 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.948000 audit[4615]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffda622898 a2=28 a3=ffffda6229c8 items=0 ppid=4258 pid=4615 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:35.948000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:15:35.948000 audit[4615]: AVC avc: denied { bpf } for pid=4615 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.948000 audit[4615]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffda622888 a2=28 a3=ffffda6229b8 items=0 ppid=4258 pid=4615 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:35.948000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:15:35.948000 audit[4615]: AVC avc: denied { bpf } for pid=4615 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.948000 audit[4615]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffda6228b8 a2=28 a3=ffffda6229e8 items=0 ppid=4258 pid=4615 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:35.948000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:15:35.948000 audit[4615]: AVC avc: denied { bpf } for pid=4615 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.948000 audit[4615]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffda622898 a2=28 a3=ffffda6229c8 items=0 ppid=4258 pid=4615 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:35.948000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:15:35.948000 audit[4615]: AVC avc: denied { bpf } for pid=4615 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.948000 audit[4615]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffda6228b8 a2=28 a3=ffffda6229e8 items=0 ppid=4258 pid=4615 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:35.948000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:15:35.948000 audit[4615]: AVC avc: denied { bpf } for pid=4615 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.948000 audit[4615]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffda622888 a2=28 a3=ffffda6229b8 items=0 ppid=4258 pid=4615 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:35.948000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:15:35.948000 audit[4615]: AVC avc: denied { bpf } for pid=4615 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.948000 audit[4615]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffda622908 a2=28 a3=ffffda622a48 items=0 ppid=4258 pid=4615 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:35.948000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:15:35.949000 audit[4615]: AVC avc: denied { perfmon } for pid=4615 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.949000 audit[4615]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffda622640 a2=50 a3=0 items=0 ppid=4258 pid=4615 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:35.949000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:15:35.949000 audit[4615]: AVC avc: denied { bpf } for pid=4615 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.949000 audit[4615]: AVC avc: denied { bpf } for pid=4615 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.949000 audit[4615]: AVC avc: denied { perfmon } for pid=4615 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.949000 audit[4615]: AVC avc: denied { perfmon } for pid=4615 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.949000 audit[4615]: AVC avc: denied { perfmon } for pid=4615 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.949000 audit[4615]: AVC avc: denied { perfmon } for pid=4615 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.949000 audit[4615]: AVC avc: denied { perfmon } for pid=4615 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.949000 audit[4615]: AVC avc: denied { bpf } for pid=4615 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.949000 audit[4615]: AVC avc: denied { bpf } for pid=4615 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.949000 audit: BPF prog-id=175 op=LOAD Dec 13 14:15:35.949000 audit[4615]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffda622648 a2=94 a3=5 items=0 ppid=4258 pid=4615 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:35.949000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:15:35.949000 audit: BPF prog-id=175 op=UNLOAD Dec 13 14:15:35.949000 audit[4615]: AVC avc: denied { perfmon } for pid=4615 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.949000 audit[4615]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffda622750 a2=50 a3=0 items=0 ppid=4258 pid=4615 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:35.949000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:15:35.949000 audit[4615]: AVC avc: denied { bpf } for pid=4615 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.949000 audit[4615]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=16 a1=ffffda622898 a2=4 a3=3 items=0 ppid=4258 pid=4615 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:35.949000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:15:35.949000 audit[4615]: AVC avc: denied { bpf } for pid=4615 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.949000 audit[4615]: AVC avc: denied { bpf } for pid=4615 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.949000 audit[4615]: AVC avc: denied { perfmon } for pid=4615 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.949000 audit[4615]: AVC avc: denied { bpf } for pid=4615 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.949000 audit[4615]: AVC avc: denied { perfmon } for pid=4615 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.949000 audit[4615]: AVC avc: denied { perfmon } for pid=4615 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.949000 audit[4615]: AVC avc: denied { perfmon } for pid=4615 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.949000 audit[4615]: AVC avc: denied { perfmon } for pid=4615 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.949000 audit[4615]: AVC avc: denied { perfmon } for pid=4615 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.949000 audit[4615]: AVC avc: denied { bpf } for pid=4615 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.949000 audit[4615]: AVC avc: denied { confidentiality } for pid=4615 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:15:35.949000 audit[4615]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffda622878 a2=94 a3=6 items=0 ppid=4258 pid=4615 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:35.949000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:15:35.950000 audit[4615]: AVC avc: denied { bpf } for pid=4615 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.950000 audit[4615]: AVC avc: denied { bpf } for pid=4615 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.950000 audit[4615]: AVC avc: denied { perfmon } for pid=4615 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.950000 audit[4615]: AVC avc: denied { bpf } for pid=4615 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.950000 audit[4615]: AVC avc: denied { perfmon } for pid=4615 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.950000 audit[4615]: AVC avc: denied { perfmon } for pid=4615 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.950000 audit[4615]: AVC avc: denied { perfmon } for pid=4615 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.950000 audit[4615]: AVC avc: denied { perfmon } for pid=4615 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.950000 audit[4615]: AVC avc: denied { perfmon } for pid=4615 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.950000 audit[4615]: AVC avc: denied { bpf } for pid=4615 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.950000 audit[4615]: AVC avc: denied { confidentiality } for pid=4615 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:15:35.950000 audit[4615]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffda622048 a2=94 a3=83 items=0 ppid=4258 pid=4615 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:35.950000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:15:35.950000 audit[4615]: AVC avc: denied { bpf } for pid=4615 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.950000 audit[4615]: AVC avc: denied { bpf } for pid=4615 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.950000 audit[4615]: AVC avc: denied { perfmon } for pid=4615 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.950000 audit[4615]: AVC avc: denied { bpf } for pid=4615 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.950000 audit[4615]: AVC avc: denied { perfmon } for pid=4615 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.950000 audit[4615]: AVC avc: denied { perfmon } for pid=4615 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.950000 audit[4615]: AVC avc: denied { perfmon } for pid=4615 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.950000 audit[4615]: AVC avc: denied { perfmon } for pid=4615 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.950000 audit[4615]: AVC avc: denied { perfmon } for pid=4615 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.950000 audit[4615]: AVC avc: denied { bpf } for pid=4615 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.950000 audit[4615]: AVC avc: denied { confidentiality } for pid=4615 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:15:35.950000 audit[4615]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffda622048 a2=94 a3=83 items=0 ppid=4258 pid=4615 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:35.950000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:15:35.951000 audit[4615]: AVC avc: denied { bpf } for pid=4615 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.951000 audit[4615]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffda623a88 a2=10 a3=ffffda623b78 items=0 ppid=4258 pid=4615 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:35.951000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:15:35.952000 audit[4615]: AVC avc: denied { bpf } for pid=4615 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.952000 audit[4615]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffda623948 a2=10 a3=ffffda623a38 items=0 ppid=4258 pid=4615 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:35.952000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:15:35.952000 audit[4615]: AVC avc: denied { bpf } for pid=4615 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.952000 audit[4615]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffda6238b8 a2=10 a3=ffffda623a38 items=0 ppid=4258 pid=4615 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:35.952000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:15:35.952000 audit[4615]: AVC avc: denied { bpf } for pid=4615 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:35.952000 audit[4615]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffda6238b8 a2=10 a3=ffffda623a38 items=0 ppid=4258 pid=4615 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:35.952000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:15:35.961000 audit: BPF prog-id=166 op=UNLOAD Dec 13 14:15:36.172000 audit[4684]: NETFILTER_CFG table=mangle:101 family=2 entries=16 op=nft_register_chain pid=4684 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:15:36.172000 audit[4684]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6868 a0=3 a1=ffffd057e920 a2=0 a3=ffff8e189fa8 items=0 ppid=4258 pid=4684 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:36.172000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:15:36.181000 audit[4681]: NETFILTER_CFG table=raw:102 family=2 entries=21 op=nft_register_chain pid=4681 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:15:36.181000 audit[4681]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=8452 a0=3 a1=ffffca937ce0 a2=0 a3=ffff8508efa8 items=0 ppid=4258 pid=4681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:36.181000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:15:36.195000 audit[4683]: NETFILTER_CFG table=nat:103 family=2 entries=15 op=nft_register_chain pid=4683 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:15:36.195000 audit[4683]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5084 a0=3 a1=fffff279cb80 a2=0 a3=ffff899cffa8 items=0 ppid=4258 pid=4683 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:36.195000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:15:36.202000 audit[4685]: NETFILTER_CFG table=filter:104 family=2 entries=105 op=nft_register_chain pid=4685 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:15:36.202000 audit[4685]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=58184 a0=3 a1=fffffecf9510 a2=0 a3=ffff9d001fa8 items=0 ppid=4258 pid=4685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:36.202000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:15:36.408148 env[1818]: time="2024-12-13T14:15:36.407902485Z" level=info msg="StopPodSandbox for \"e099ef2e1e3bc483dbe1d9dee04d0daddb09d4c56697af84981172bca0b8a579\"" Dec 13 14:15:36.422074 env[1818]: time="2024-12-13T14:15:36.421941363Z" level=info msg="StopPodSandbox for \"7e68373161df4d8c1efce295e827b9367fb698838bb827165039f5e538e06d51\"" Dec 13 14:15:36.493000 audit[2664]: AVC avc: denied { watch } for pid=2664 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=8270 scontext=system_u:system_r:svirt_lxc_net_t:s0:c127,c295 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:15:36.497699 kernel: kauditd_printk_skb: 742 callbacks suppressed Dec 13 14:15:36.498668 kernel: audit: type=1400 audit(1734099336.493:1186): avc: denied { watch } for pid=2664 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=8270 scontext=system_u:system_r:svirt_lxc_net_t:s0:c127,c295 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:15:36.493000 audit[2664]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000ba2fc0 a2=fc6 a3=0 items=0 ppid=2518 pid=2664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c127,c295 key=(null) Dec 13 14:15:36.526338 kernel: audit: type=1300 audit(1734099336.493:1186): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000ba2fc0 a2=fc6 a3=0 items=0 ppid=2518 pid=2664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c127,c295 key=(null) Dec 13 14:15:36.493000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:15:36.555575 kernel: audit: type=1327 audit(1734099336.493:1186): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:15:36.493000 audit[2664]: AVC avc: denied { watch } for pid=2664 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=8277 scontext=system_u:system_r:svirt_lxc_net_t:s0:c127,c295 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:15:36.565660 kernel: audit: type=1400 audit(1734099336.493:1187): avc: denied { watch } for pid=2664 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=8277 scontext=system_u:system_r:svirt_lxc_net_t:s0:c127,c295 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:15:36.493000 audit[2664]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400082ccc0 a2=fc6 a3=0 items=0 ppid=2518 pid=2664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c127,c295 key=(null) Dec 13 14:15:36.579434 kernel: audit: type=1300 audit(1734099336.493:1187): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400082ccc0 a2=fc6 a3=0 items=0 ppid=2518 pid=2664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c127,c295 key=(null) Dec 13 14:15:36.582722 kernel: audit: type=1327 audit(1734099336.493:1187): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:15:36.493000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:15:36.704624 kubelet[3066]: I1213 14:15:36.704300 3066 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-76f75df574-5kblv" podStartSLOduration=41.704208126 podStartE2EDuration="41.704208126s" podCreationTimestamp="2024-12-13 14:14:55 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:15:35.74407877 +0000 UTC m=+53.586352259" watchObservedRunningTime="2024-12-13 14:15:36.704208126 +0000 UTC m=+54.546481627" Dec 13 14:15:36.828000 audit[4747]: NETFILTER_CFG table=filter:105 family=2 entries=13 op=nft_register_rule pid=4747 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:15:36.828000 audit[4747]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=ffffd84b6f30 a2=0 a3=1 items=0 ppid=3199 pid=4747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:36.850803 kernel: audit: type=1325 audit(1734099336.828:1188): table=filter:105 family=2 entries=13 op=nft_register_rule pid=4747 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:15:36.850961 kernel: audit: type=1300 audit(1734099336.828:1188): arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=ffffd84b6f30 a2=0 a3=1 items=0 ppid=3199 pid=4747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:36.851518 systemd-networkd[1540]: cali0e8cf072f73: Gained IPv6LL Dec 13 14:15:36.828000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:15:36.860076 kernel: audit: type=1327 audit(1734099336.828:1188): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:15:36.853000 audit[4747]: NETFILTER_CFG table=nat:106 family=2 entries=35 op=nft_register_chain pid=4747 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:15:36.881588 kernel: audit: type=1325 audit(1734099336.853:1189): table=nat:106 family=2 entries=35 op=nft_register_chain pid=4747 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:15:36.853000 audit[4747]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=14196 a0=3 a1=ffffd84b6f30 a2=0 a3=1 items=0 ppid=3199 pid=4747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:36.853000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:15:36.896192 env[1818]: 2024-12-13 14:15:36.727 [INFO][4719] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="e099ef2e1e3bc483dbe1d9dee04d0daddb09d4c56697af84981172bca0b8a579" Dec 13 14:15:36.896192 env[1818]: 2024-12-13 14:15:36.727 [INFO][4719] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="e099ef2e1e3bc483dbe1d9dee04d0daddb09d4c56697af84981172bca0b8a579" iface="eth0" netns="/var/run/netns/cni-38a69652-523c-b201-bf98-3449c0240f5c" Dec 13 14:15:36.896192 env[1818]: 2024-12-13 14:15:36.728 [INFO][4719] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="e099ef2e1e3bc483dbe1d9dee04d0daddb09d4c56697af84981172bca0b8a579" iface="eth0" netns="/var/run/netns/cni-38a69652-523c-b201-bf98-3449c0240f5c" Dec 13 14:15:36.896192 env[1818]: 2024-12-13 14:15:36.730 [INFO][4719] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="e099ef2e1e3bc483dbe1d9dee04d0daddb09d4c56697af84981172bca0b8a579" iface="eth0" netns="/var/run/netns/cni-38a69652-523c-b201-bf98-3449c0240f5c" Dec 13 14:15:36.896192 env[1818]: 2024-12-13 14:15:36.730 [INFO][4719] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="e099ef2e1e3bc483dbe1d9dee04d0daddb09d4c56697af84981172bca0b8a579" Dec 13 14:15:36.896192 env[1818]: 2024-12-13 14:15:36.730 [INFO][4719] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e099ef2e1e3bc483dbe1d9dee04d0daddb09d4c56697af84981172bca0b8a579" Dec 13 14:15:36.896192 env[1818]: 2024-12-13 14:15:36.831 [INFO][4740] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="e099ef2e1e3bc483dbe1d9dee04d0daddb09d4c56697af84981172bca0b8a579" HandleID="k8s-pod-network.e099ef2e1e3bc483dbe1d9dee04d0daddb09d4c56697af84981172bca0b8a579" Workload="ip--172--31--18--231-k8s-csi--node--driver--r2mtx-eth0" Dec 13 14:15:36.896192 env[1818]: 2024-12-13 14:15:36.831 [INFO][4740] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:15:36.896192 env[1818]: 2024-12-13 14:15:36.831 [INFO][4740] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:15:36.896192 env[1818]: 2024-12-13 14:15:36.886 [WARNING][4740] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="e099ef2e1e3bc483dbe1d9dee04d0daddb09d4c56697af84981172bca0b8a579" HandleID="k8s-pod-network.e099ef2e1e3bc483dbe1d9dee04d0daddb09d4c56697af84981172bca0b8a579" Workload="ip--172--31--18--231-k8s-csi--node--driver--r2mtx-eth0" Dec 13 14:15:36.896192 env[1818]: 2024-12-13 14:15:36.886 [INFO][4740] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="e099ef2e1e3bc483dbe1d9dee04d0daddb09d4c56697af84981172bca0b8a579" HandleID="k8s-pod-network.e099ef2e1e3bc483dbe1d9dee04d0daddb09d4c56697af84981172bca0b8a579" Workload="ip--172--31--18--231-k8s-csi--node--driver--r2mtx-eth0" Dec 13 14:15:36.896192 env[1818]: 2024-12-13 14:15:36.890 [INFO][4740] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:15:36.896192 env[1818]: 2024-12-13 14:15:36.892 [INFO][4719] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="e099ef2e1e3bc483dbe1d9dee04d0daddb09d4c56697af84981172bca0b8a579" Dec 13 14:15:36.903611 systemd[1]: run-netns-cni\x2d38a69652\x2d523c\x2db201\x2dbf98\x2d3449c0240f5c.mount: Deactivated successfully. Dec 13 14:15:36.907598 env[1818]: time="2024-12-13T14:15:36.907527209Z" level=info msg="TearDown network for sandbox \"e099ef2e1e3bc483dbe1d9dee04d0daddb09d4c56697af84981172bca0b8a579\" successfully" Dec 13 14:15:36.907598 env[1818]: time="2024-12-13T14:15:36.907588926Z" level=info msg="StopPodSandbox for \"e099ef2e1e3bc483dbe1d9dee04d0daddb09d4c56697af84981172bca0b8a579\" returns successfully" Dec 13 14:15:36.910695 env[1818]: time="2024-12-13T14:15:36.910618088Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-r2mtx,Uid:598fbb62-2ff1-4c40-b8a5-720bd020a409,Namespace:calico-system,Attempt:1,}" Dec 13 14:15:36.920719 env[1818]: 2024-12-13 14:15:36.710 [INFO][4724] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="7e68373161df4d8c1efce295e827b9367fb698838bb827165039f5e538e06d51" Dec 13 14:15:36.920719 env[1818]: 2024-12-13 14:15:36.711 [INFO][4724] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="7e68373161df4d8c1efce295e827b9367fb698838bb827165039f5e538e06d51" iface="eth0" netns="/var/run/netns/cni-443d2bf1-5f51-d5c6-5324-87963d2c683c" Dec 13 14:15:36.920719 env[1818]: 2024-12-13 14:15:36.711 [INFO][4724] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="7e68373161df4d8c1efce295e827b9367fb698838bb827165039f5e538e06d51" iface="eth0" netns="/var/run/netns/cni-443d2bf1-5f51-d5c6-5324-87963d2c683c" Dec 13 14:15:36.920719 env[1818]: 2024-12-13 14:15:36.711 [INFO][4724] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="7e68373161df4d8c1efce295e827b9367fb698838bb827165039f5e538e06d51" iface="eth0" netns="/var/run/netns/cni-443d2bf1-5f51-d5c6-5324-87963d2c683c" Dec 13 14:15:36.920719 env[1818]: 2024-12-13 14:15:36.711 [INFO][4724] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="7e68373161df4d8c1efce295e827b9367fb698838bb827165039f5e538e06d51" Dec 13 14:15:36.920719 env[1818]: 2024-12-13 14:15:36.711 [INFO][4724] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="7e68373161df4d8c1efce295e827b9367fb698838bb827165039f5e538e06d51" Dec 13 14:15:36.920719 env[1818]: 2024-12-13 14:15:36.849 [INFO][4736] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="7e68373161df4d8c1efce295e827b9367fb698838bb827165039f5e538e06d51" HandleID="k8s-pod-network.7e68373161df4d8c1efce295e827b9367fb698838bb827165039f5e538e06d51" Workload="ip--172--31--18--231-k8s-calico--kube--controllers--747dd4679c--kfxmw-eth0" Dec 13 14:15:36.920719 env[1818]: 2024-12-13 14:15:36.850 [INFO][4736] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:15:36.920719 env[1818]: 2024-12-13 14:15:36.889 [INFO][4736] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:15:36.920719 env[1818]: 2024-12-13 14:15:36.910 [WARNING][4736] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="7e68373161df4d8c1efce295e827b9367fb698838bb827165039f5e538e06d51" HandleID="k8s-pod-network.7e68373161df4d8c1efce295e827b9367fb698838bb827165039f5e538e06d51" Workload="ip--172--31--18--231-k8s-calico--kube--controllers--747dd4679c--kfxmw-eth0" Dec 13 14:15:36.920719 env[1818]: 2024-12-13 14:15:36.910 [INFO][4736] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="7e68373161df4d8c1efce295e827b9367fb698838bb827165039f5e538e06d51" HandleID="k8s-pod-network.7e68373161df4d8c1efce295e827b9367fb698838bb827165039f5e538e06d51" Workload="ip--172--31--18--231-k8s-calico--kube--controllers--747dd4679c--kfxmw-eth0" Dec 13 14:15:36.920719 env[1818]: 2024-12-13 14:15:36.915 [INFO][4736] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:15:36.920719 env[1818]: 2024-12-13 14:15:36.917 [INFO][4724] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="7e68373161df4d8c1efce295e827b9367fb698838bb827165039f5e538e06d51" Dec 13 14:15:36.926932 systemd[1]: run-netns-cni\x2d443d2bf1\x2d5f51\x2dd5c6\x2d5324\x2d87963d2c683c.mount: Deactivated successfully. Dec 13 14:15:36.930806 env[1818]: time="2024-12-13T14:15:36.930729846Z" level=info msg="TearDown network for sandbox \"7e68373161df4d8c1efce295e827b9367fb698838bb827165039f5e538e06d51\" successfully" Dec 13 14:15:36.930806 env[1818]: time="2024-12-13T14:15:36.930796592Z" level=info msg="StopPodSandbox for \"7e68373161df4d8c1efce295e827b9367fb698838bb827165039f5e538e06d51\" returns successfully" Dec 13 14:15:36.932873 env[1818]: time="2024-12-13T14:15:36.932247871Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-747dd4679c-kfxmw,Uid:55f96ceb-5c45-4365-b359-551ac19183ea,Namespace:calico-system,Attempt:1,}" Dec 13 14:15:37.233816 systemd-networkd[1540]: vxlan.calico: Gained IPv6LL Dec 13 14:15:37.299231 systemd-networkd[1540]: cali52d66785597: Link UP Dec 13 14:15:37.300107 (udev-worker)[4617]: Network interface NamePolicy= disabled on kernel command line. Dec 13 14:15:37.311861 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:15:37.312132 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali52d66785597: link becomes ready Dec 13 14:15:37.312373 systemd-networkd[1540]: cali52d66785597: Gained carrier Dec 13 14:15:37.370827 env[1818]: 2024-12-13 14:15:37.063 [INFO][4751] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--18--231-k8s-csi--node--driver--r2mtx-eth0 csi-node-driver- calico-system 598fbb62-2ff1-4c40-b8a5-720bd020a409 860 0 2024-12-13 14:15:07 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:55b695c467 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s ip-172-31-18-231 csi-node-driver-r2mtx eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali52d66785597 [] []}} ContainerID="61f5ef52a7faf544c16cba1d3e653763ad2a02a602e536a9835ac431621518ae" Namespace="calico-system" Pod="csi-node-driver-r2mtx" WorkloadEndpoint="ip--172--31--18--231-k8s-csi--node--driver--r2mtx-" Dec 13 14:15:37.370827 env[1818]: 2024-12-13 14:15:37.064 [INFO][4751] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="61f5ef52a7faf544c16cba1d3e653763ad2a02a602e536a9835ac431621518ae" Namespace="calico-system" Pod="csi-node-driver-r2mtx" WorkloadEndpoint="ip--172--31--18--231-k8s-csi--node--driver--r2mtx-eth0" Dec 13 14:15:37.370827 env[1818]: 2024-12-13 14:15:37.167 [INFO][4775] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="61f5ef52a7faf544c16cba1d3e653763ad2a02a602e536a9835ac431621518ae" HandleID="k8s-pod-network.61f5ef52a7faf544c16cba1d3e653763ad2a02a602e536a9835ac431621518ae" Workload="ip--172--31--18--231-k8s-csi--node--driver--r2mtx-eth0" Dec 13 14:15:37.370827 env[1818]: 2024-12-13 14:15:37.199 [INFO][4775] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="61f5ef52a7faf544c16cba1d3e653763ad2a02a602e536a9835ac431621518ae" HandleID="k8s-pod-network.61f5ef52a7faf544c16cba1d3e653763ad2a02a602e536a9835ac431621518ae" Workload="ip--172--31--18--231-k8s-csi--node--driver--r2mtx-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002a0960), Attrs:map[string]string{"namespace":"calico-system", "node":"ip-172-31-18-231", "pod":"csi-node-driver-r2mtx", "timestamp":"2024-12-13 14:15:37.167871504 +0000 UTC"}, Hostname:"ip-172-31-18-231", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:15:37.370827 env[1818]: 2024-12-13 14:15:37.199 [INFO][4775] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:15:37.370827 env[1818]: 2024-12-13 14:15:37.200 [INFO][4775] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:15:37.370827 env[1818]: 2024-12-13 14:15:37.200 [INFO][4775] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-18-231' Dec 13 14:15:37.370827 env[1818]: 2024-12-13 14:15:37.204 [INFO][4775] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.61f5ef52a7faf544c16cba1d3e653763ad2a02a602e536a9835ac431621518ae" host="ip-172-31-18-231" Dec 13 14:15:37.370827 env[1818]: 2024-12-13 14:15:37.215 [INFO][4775] ipam/ipam.go 372: Looking up existing affinities for host host="ip-172-31-18-231" Dec 13 14:15:37.370827 env[1818]: 2024-12-13 14:15:37.226 [INFO][4775] ipam/ipam.go 489: Trying affinity for 192.168.34.128/26 host="ip-172-31-18-231" Dec 13 14:15:37.370827 env[1818]: 2024-12-13 14:15:37.240 [INFO][4775] ipam/ipam.go 155: Attempting to load block cidr=192.168.34.128/26 host="ip-172-31-18-231" Dec 13 14:15:37.370827 env[1818]: 2024-12-13 14:15:37.246 [INFO][4775] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.34.128/26 host="ip-172-31-18-231" Dec 13 14:15:37.370827 env[1818]: 2024-12-13 14:15:37.246 [INFO][4775] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.34.128/26 handle="k8s-pod-network.61f5ef52a7faf544c16cba1d3e653763ad2a02a602e536a9835ac431621518ae" host="ip-172-31-18-231" Dec 13 14:15:37.370827 env[1818]: 2024-12-13 14:15:37.258 [INFO][4775] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.61f5ef52a7faf544c16cba1d3e653763ad2a02a602e536a9835ac431621518ae Dec 13 14:15:37.370827 env[1818]: 2024-12-13 14:15:37.268 [INFO][4775] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.34.128/26 handle="k8s-pod-network.61f5ef52a7faf544c16cba1d3e653763ad2a02a602e536a9835ac431621518ae" host="ip-172-31-18-231" Dec 13 14:15:37.370827 env[1818]: 2024-12-13 14:15:37.283 [INFO][4775] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.34.131/26] block=192.168.34.128/26 handle="k8s-pod-network.61f5ef52a7faf544c16cba1d3e653763ad2a02a602e536a9835ac431621518ae" host="ip-172-31-18-231" Dec 13 14:15:37.370827 env[1818]: 2024-12-13 14:15:37.283 [INFO][4775] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.34.131/26] handle="k8s-pod-network.61f5ef52a7faf544c16cba1d3e653763ad2a02a602e536a9835ac431621518ae" host="ip-172-31-18-231" Dec 13 14:15:37.370827 env[1818]: 2024-12-13 14:15:37.284 [INFO][4775] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:15:37.370827 env[1818]: 2024-12-13 14:15:37.284 [INFO][4775] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.34.131/26] IPv6=[] ContainerID="61f5ef52a7faf544c16cba1d3e653763ad2a02a602e536a9835ac431621518ae" HandleID="k8s-pod-network.61f5ef52a7faf544c16cba1d3e653763ad2a02a602e536a9835ac431621518ae" Workload="ip--172--31--18--231-k8s-csi--node--driver--r2mtx-eth0" Dec 13 14:15:37.372310 env[1818]: 2024-12-13 14:15:37.287 [INFO][4751] cni-plugin/k8s.go 386: Populated endpoint ContainerID="61f5ef52a7faf544c16cba1d3e653763ad2a02a602e536a9835ac431621518ae" Namespace="calico-system" Pod="csi-node-driver-r2mtx" WorkloadEndpoint="ip--172--31--18--231-k8s-csi--node--driver--r2mtx-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--18--231-k8s-csi--node--driver--r2mtx-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"598fbb62-2ff1-4c40-b8a5-720bd020a409", ResourceVersion:"860", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 15, 7, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b695c467", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-18-231", ContainerID:"", Pod:"csi-node-driver-r2mtx", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.34.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali52d66785597", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:15:37.372310 env[1818]: 2024-12-13 14:15:37.288 [INFO][4751] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.34.131/32] ContainerID="61f5ef52a7faf544c16cba1d3e653763ad2a02a602e536a9835ac431621518ae" Namespace="calico-system" Pod="csi-node-driver-r2mtx" WorkloadEndpoint="ip--172--31--18--231-k8s-csi--node--driver--r2mtx-eth0" Dec 13 14:15:37.372310 env[1818]: 2024-12-13 14:15:37.288 [INFO][4751] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali52d66785597 ContainerID="61f5ef52a7faf544c16cba1d3e653763ad2a02a602e536a9835ac431621518ae" Namespace="calico-system" Pod="csi-node-driver-r2mtx" WorkloadEndpoint="ip--172--31--18--231-k8s-csi--node--driver--r2mtx-eth0" Dec 13 14:15:37.372310 env[1818]: 2024-12-13 14:15:37.313 [INFO][4751] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="61f5ef52a7faf544c16cba1d3e653763ad2a02a602e536a9835ac431621518ae" Namespace="calico-system" Pod="csi-node-driver-r2mtx" WorkloadEndpoint="ip--172--31--18--231-k8s-csi--node--driver--r2mtx-eth0" Dec 13 14:15:37.372310 env[1818]: 2024-12-13 14:15:37.321 [INFO][4751] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="61f5ef52a7faf544c16cba1d3e653763ad2a02a602e536a9835ac431621518ae" Namespace="calico-system" Pod="csi-node-driver-r2mtx" WorkloadEndpoint="ip--172--31--18--231-k8s-csi--node--driver--r2mtx-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--18--231-k8s-csi--node--driver--r2mtx-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"598fbb62-2ff1-4c40-b8a5-720bd020a409", ResourceVersion:"860", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 15, 7, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b695c467", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-18-231", ContainerID:"61f5ef52a7faf544c16cba1d3e653763ad2a02a602e536a9835ac431621518ae", Pod:"csi-node-driver-r2mtx", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.34.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali52d66785597", MAC:"62:ad:b4:b5:83:ed", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:15:37.372310 env[1818]: 2024-12-13 14:15:37.365 [INFO][4751] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="61f5ef52a7faf544c16cba1d3e653763ad2a02a602e536a9835ac431621518ae" Namespace="calico-system" Pod="csi-node-driver-r2mtx" WorkloadEndpoint="ip--172--31--18--231-k8s-csi--node--driver--r2mtx-eth0" Dec 13 14:15:37.401844 env[1818]: time="2024-12-13T14:15:37.401200553Z" level=info msg="StopPodSandbox for \"fd62489a291fe65369fc57679c6a79016dcb022de2a65ff0cb240039c436bada\"" Dec 13 14:15:37.402012 env[1818]: time="2024-12-13T14:15:37.401947174Z" level=info msg="StopPodSandbox for \"4efd2f0a680ad6d670ab93646b15d79ac1cbbc75b8e87abe3d3d6dcab3115dfa\"" Dec 13 14:15:37.466409 systemd-networkd[1540]: cali05ba6d11cd5: Link UP Dec 13 14:15:37.471515 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali05ba6d11cd5: link becomes ready Dec 13 14:15:37.471704 systemd-networkd[1540]: cali05ba6d11cd5: Gained carrier Dec 13 14:15:37.491000 audit[4827]: NETFILTER_CFG table=filter:107 family=2 entries=42 op=nft_register_chain pid=4827 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:15:37.491000 audit[4827]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=21524 a0=3 a1=ffffde7c9cb0 a2=0 a3=ffffb2cecfa8 items=0 ppid=4258 pid=4827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:37.491000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:15:37.520502 env[1818]: time="2024-12-13T14:15:37.520073412Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:15:37.520502 env[1818]: time="2024-12-13T14:15:37.520154690Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:15:37.520502 env[1818]: time="2024-12-13T14:15:37.520181546Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:15:37.521186 env[1818]: time="2024-12-13T14:15:37.521002678Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/61f5ef52a7faf544c16cba1d3e653763ad2a02a602e536a9835ac431621518ae pid=4836 runtime=io.containerd.runc.v2 Dec 13 14:15:37.529246 env[1818]: 2024-12-13 14:15:37.109 [INFO][4762] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--18--231-k8s-calico--kube--controllers--747dd4679c--kfxmw-eth0 calico-kube-controllers-747dd4679c- calico-system 55f96ceb-5c45-4365-b359-551ac19183ea 859 0 2024-12-13 14:15:07 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:747dd4679c projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ip-172-31-18-231 calico-kube-controllers-747dd4679c-kfxmw eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali05ba6d11cd5 [] []}} ContainerID="05ef2bae75ec9f93c24c1a295ce3d26c07052bc4cf87733e4585b99bccd7f077" Namespace="calico-system" Pod="calico-kube-controllers-747dd4679c-kfxmw" WorkloadEndpoint="ip--172--31--18--231-k8s-calico--kube--controllers--747dd4679c--kfxmw-" Dec 13 14:15:37.529246 env[1818]: 2024-12-13 14:15:37.110 [INFO][4762] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="05ef2bae75ec9f93c24c1a295ce3d26c07052bc4cf87733e4585b99bccd7f077" Namespace="calico-system" Pod="calico-kube-controllers-747dd4679c-kfxmw" WorkloadEndpoint="ip--172--31--18--231-k8s-calico--kube--controllers--747dd4679c--kfxmw-eth0" Dec 13 14:15:37.529246 env[1818]: 2024-12-13 14:15:37.227 [INFO][4780] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="05ef2bae75ec9f93c24c1a295ce3d26c07052bc4cf87733e4585b99bccd7f077" HandleID="k8s-pod-network.05ef2bae75ec9f93c24c1a295ce3d26c07052bc4cf87733e4585b99bccd7f077" Workload="ip--172--31--18--231-k8s-calico--kube--controllers--747dd4679c--kfxmw-eth0" Dec 13 14:15:37.529246 env[1818]: 2024-12-13 14:15:37.270 [INFO][4780] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="05ef2bae75ec9f93c24c1a295ce3d26c07052bc4cf87733e4585b99bccd7f077" HandleID="k8s-pod-network.05ef2bae75ec9f93c24c1a295ce3d26c07052bc4cf87733e4585b99bccd7f077" Workload="ip--172--31--18--231-k8s-calico--kube--controllers--747dd4679c--kfxmw-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400004d430), Attrs:map[string]string{"namespace":"calico-system", "node":"ip-172-31-18-231", "pod":"calico-kube-controllers-747dd4679c-kfxmw", "timestamp":"2024-12-13 14:15:37.227196205 +0000 UTC"}, Hostname:"ip-172-31-18-231", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:15:37.529246 env[1818]: 2024-12-13 14:15:37.271 [INFO][4780] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:15:37.529246 env[1818]: 2024-12-13 14:15:37.284 [INFO][4780] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:15:37.529246 env[1818]: 2024-12-13 14:15:37.284 [INFO][4780] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-18-231' Dec 13 14:15:37.529246 env[1818]: 2024-12-13 14:15:37.297 [INFO][4780] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.05ef2bae75ec9f93c24c1a295ce3d26c07052bc4cf87733e4585b99bccd7f077" host="ip-172-31-18-231" Dec 13 14:15:37.529246 env[1818]: 2024-12-13 14:15:37.324 [INFO][4780] ipam/ipam.go 372: Looking up existing affinities for host host="ip-172-31-18-231" Dec 13 14:15:37.529246 env[1818]: 2024-12-13 14:15:37.341 [INFO][4780] ipam/ipam.go 489: Trying affinity for 192.168.34.128/26 host="ip-172-31-18-231" Dec 13 14:15:37.529246 env[1818]: 2024-12-13 14:15:37.351 [INFO][4780] ipam/ipam.go 155: Attempting to load block cidr=192.168.34.128/26 host="ip-172-31-18-231" Dec 13 14:15:37.529246 env[1818]: 2024-12-13 14:15:37.363 [INFO][4780] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.34.128/26 host="ip-172-31-18-231" Dec 13 14:15:37.529246 env[1818]: 2024-12-13 14:15:37.363 [INFO][4780] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.34.128/26 handle="k8s-pod-network.05ef2bae75ec9f93c24c1a295ce3d26c07052bc4cf87733e4585b99bccd7f077" host="ip-172-31-18-231" Dec 13 14:15:37.529246 env[1818]: 2024-12-13 14:15:37.371 [INFO][4780] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.05ef2bae75ec9f93c24c1a295ce3d26c07052bc4cf87733e4585b99bccd7f077 Dec 13 14:15:37.529246 env[1818]: 2024-12-13 14:15:37.414 [INFO][4780] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.34.128/26 handle="k8s-pod-network.05ef2bae75ec9f93c24c1a295ce3d26c07052bc4cf87733e4585b99bccd7f077" host="ip-172-31-18-231" Dec 13 14:15:37.529246 env[1818]: 2024-12-13 14:15:37.431 [INFO][4780] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.34.132/26] block=192.168.34.128/26 handle="k8s-pod-network.05ef2bae75ec9f93c24c1a295ce3d26c07052bc4cf87733e4585b99bccd7f077" host="ip-172-31-18-231" Dec 13 14:15:37.529246 env[1818]: 2024-12-13 14:15:37.431 [INFO][4780] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.34.132/26] handle="k8s-pod-network.05ef2bae75ec9f93c24c1a295ce3d26c07052bc4cf87733e4585b99bccd7f077" host="ip-172-31-18-231" Dec 13 14:15:37.529246 env[1818]: 2024-12-13 14:15:37.431 [INFO][4780] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:15:37.529246 env[1818]: 2024-12-13 14:15:37.431 [INFO][4780] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.34.132/26] IPv6=[] ContainerID="05ef2bae75ec9f93c24c1a295ce3d26c07052bc4cf87733e4585b99bccd7f077" HandleID="k8s-pod-network.05ef2bae75ec9f93c24c1a295ce3d26c07052bc4cf87733e4585b99bccd7f077" Workload="ip--172--31--18--231-k8s-calico--kube--controllers--747dd4679c--kfxmw-eth0" Dec 13 14:15:37.530761 env[1818]: 2024-12-13 14:15:37.437 [INFO][4762] cni-plugin/k8s.go 386: Populated endpoint ContainerID="05ef2bae75ec9f93c24c1a295ce3d26c07052bc4cf87733e4585b99bccd7f077" Namespace="calico-system" Pod="calico-kube-controllers-747dd4679c-kfxmw" WorkloadEndpoint="ip--172--31--18--231-k8s-calico--kube--controllers--747dd4679c--kfxmw-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--18--231-k8s-calico--kube--controllers--747dd4679c--kfxmw-eth0", GenerateName:"calico-kube-controllers-747dd4679c-", Namespace:"calico-system", SelfLink:"", UID:"55f96ceb-5c45-4365-b359-551ac19183ea", ResourceVersion:"859", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 15, 7, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"747dd4679c", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-18-231", ContainerID:"", Pod:"calico-kube-controllers-747dd4679c-kfxmw", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.34.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali05ba6d11cd5", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:15:37.530761 env[1818]: 2024-12-13 14:15:37.437 [INFO][4762] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.34.132/32] ContainerID="05ef2bae75ec9f93c24c1a295ce3d26c07052bc4cf87733e4585b99bccd7f077" Namespace="calico-system" Pod="calico-kube-controllers-747dd4679c-kfxmw" WorkloadEndpoint="ip--172--31--18--231-k8s-calico--kube--controllers--747dd4679c--kfxmw-eth0" Dec 13 14:15:37.530761 env[1818]: 2024-12-13 14:15:37.437 [INFO][4762] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali05ba6d11cd5 ContainerID="05ef2bae75ec9f93c24c1a295ce3d26c07052bc4cf87733e4585b99bccd7f077" Namespace="calico-system" Pod="calico-kube-controllers-747dd4679c-kfxmw" WorkloadEndpoint="ip--172--31--18--231-k8s-calico--kube--controllers--747dd4679c--kfxmw-eth0" Dec 13 14:15:37.530761 env[1818]: 2024-12-13 14:15:37.472 [INFO][4762] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="05ef2bae75ec9f93c24c1a295ce3d26c07052bc4cf87733e4585b99bccd7f077" Namespace="calico-system" Pod="calico-kube-controllers-747dd4679c-kfxmw" WorkloadEndpoint="ip--172--31--18--231-k8s-calico--kube--controllers--747dd4679c--kfxmw-eth0" Dec 13 14:15:37.530761 env[1818]: 2024-12-13 14:15:37.482 [INFO][4762] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="05ef2bae75ec9f93c24c1a295ce3d26c07052bc4cf87733e4585b99bccd7f077" Namespace="calico-system" Pod="calico-kube-controllers-747dd4679c-kfxmw" WorkloadEndpoint="ip--172--31--18--231-k8s-calico--kube--controllers--747dd4679c--kfxmw-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--18--231-k8s-calico--kube--controllers--747dd4679c--kfxmw-eth0", GenerateName:"calico-kube-controllers-747dd4679c-", Namespace:"calico-system", SelfLink:"", UID:"55f96ceb-5c45-4365-b359-551ac19183ea", ResourceVersion:"859", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 15, 7, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"747dd4679c", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-18-231", ContainerID:"05ef2bae75ec9f93c24c1a295ce3d26c07052bc4cf87733e4585b99bccd7f077", Pod:"calico-kube-controllers-747dd4679c-kfxmw", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.34.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali05ba6d11cd5", MAC:"82:9a:ba:ba:a8:03", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:15:37.530761 env[1818]: 2024-12-13 14:15:37.524 [INFO][4762] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="05ef2bae75ec9f93c24c1a295ce3d26c07052bc4cf87733e4585b99bccd7f077" Namespace="calico-system" Pod="calico-kube-controllers-747dd4679c-kfxmw" WorkloadEndpoint="ip--172--31--18--231-k8s-calico--kube--controllers--747dd4679c--kfxmw-eth0" Dec 13 14:15:37.627370 systemd[1]: Started cri-containerd-61f5ef52a7faf544c16cba1d3e653763ad2a02a602e536a9835ac431621518ae.scope. Dec 13 14:15:37.666000 audit[2638]: AVC avc: denied { watch } for pid=2638 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=8277 scontext=system_u:system_r:svirt_lxc_net_t:s0:c190,c319 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:15:37.666000 audit[2638]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6a a1=4009f17e30 a2=fc6 a3=0 items=0 ppid=2488 pid=2638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c190,c319 key=(null) Dec 13 14:15:37.666000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31382E323331002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:15:37.666000 audit[2638]: AVC avc: denied { watch } for pid=2638 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=8270 scontext=system_u:system_r:svirt_lxc_net_t:s0:c190,c319 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:15:37.666000 audit[2638]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6a a1=40098fe320 a2=fc6 a3=0 items=0 ppid=2488 pid=2638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c190,c319 key=(null) Dec 13 14:15:37.666000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31382E323331002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:15:37.666000 audit[2638]: AVC avc: denied { watch } for pid=2638 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=8272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c190,c319 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:15:37.666000 audit[2638]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6a a1=4009f17ec0 a2=fc6 a3=0 items=0 ppid=2488 pid=2638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c190,c319 key=(null) Dec 13 14:15:37.666000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31382E323331002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:15:37.685000 audit[2638]: AVC avc: denied { watch } for pid=2638 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=8279 scontext=system_u:system_r:svirt_lxc_net_t:s0:c190,c319 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:15:37.685000 audit[2638]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6a a1=4009ea8900 a2=fc6 a3=0 items=0 ppid=2488 pid=2638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c190,c319 key=(null) Dec 13 14:15:37.685000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31382E323331002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:15:37.690000 audit[2638]: AVC avc: denied { watch } for pid=2638 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=8277 scontext=system_u:system_r:svirt_lxc_net_t:s0:c190,c319 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:15:37.690000 audit[2638]: AVC avc: denied { watch } for pid=2638 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=8270 scontext=system_u:system_r:svirt_lxc_net_t:s0:c190,c319 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:15:37.690000 audit[2638]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6c a1=40098feb60 a2=fc6 a3=0 items=0 ppid=2488 pid=2638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c190,c319 key=(null) Dec 13 14:15:37.690000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31382E323331002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:15:37.690000 audit[2638]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6a a1=4009ec7bc0 a2=fc6 a3=0 items=0 ppid=2488 pid=2638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c190,c319 key=(null) Dec 13 14:15:37.690000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31382E323331002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:15:37.686000 audit[4880]: NETFILTER_CFG table=filter:108 family=2 entries=48 op=nft_register_chain pid=4880 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:15:37.686000 audit[4880]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=23868 a0=3 a1=ffffceca4430 a2=0 a3=ffff93d7efa8 items=0 ppid=4258 pid=4880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:37.686000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:15:37.731400 env[1818]: time="2024-12-13T14:15:37.730876254Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:15:37.731400 env[1818]: time="2024-12-13T14:15:37.730989861Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:15:37.731400 env[1818]: time="2024-12-13T14:15:37.731017509Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:15:37.733135 env[1818]: time="2024-12-13T14:15:37.732970892Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/05ef2bae75ec9f93c24c1a295ce3d26c07052bc4cf87733e4585b99bccd7f077 pid=4883 runtime=io.containerd.runc.v2 Dec 13 14:15:37.863006 systemd[1]: Started cri-containerd-05ef2bae75ec9f93c24c1a295ce3d26c07052bc4cf87733e4585b99bccd7f077.scope. Dec 13 14:15:37.936000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:37.936000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:37.936000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:37.936000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:37.936000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:37.936000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:37.936000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:37.936000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:37.936000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:37.937000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:37.937000 audit: BPF prog-id=176 op=LOAD Dec 13 14:15:37.939000 audit[4853]: AVC avc: denied { bpf } for pid=4853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:37.939000 audit[4853]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4836 pid=4853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:37.939000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631663565663532613766616635343463313663626131643365363533 Dec 13 14:15:37.940000 audit[4853]: AVC avc: denied { perfmon } for pid=4853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:37.940000 audit[4853]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4836 pid=4853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:37.940000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631663565663532613766616635343463313663626131643365363533 Dec 13 14:15:37.942000 audit[4853]: AVC avc: denied { bpf } for pid=4853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:37.942000 audit[4853]: AVC avc: denied { bpf } for pid=4853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:37.942000 audit[4853]: AVC avc: denied { bpf } for pid=4853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:37.942000 audit[4853]: AVC avc: denied { perfmon } for pid=4853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:37.942000 audit[4853]: AVC avc: denied { perfmon } for pid=4853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:37.942000 audit[4853]: AVC avc: denied { perfmon } for pid=4853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:37.942000 audit[4853]: AVC avc: denied { perfmon } for pid=4853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:37.942000 audit[4853]: AVC avc: denied { perfmon } for pid=4853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:37.942000 audit[4853]: AVC avc: denied { bpf } for pid=4853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:37.942000 audit[4853]: AVC avc: denied { bpf } for pid=4853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:37.942000 audit: BPF prog-id=177 op=LOAD Dec 13 14:15:37.942000 audit[4853]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4836 pid=4853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:37.942000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631663565663532613766616635343463313663626131643365363533 Dec 13 14:15:37.944000 audit[4853]: AVC avc: denied { bpf } for pid=4853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:37.944000 audit[4853]: AVC avc: denied { bpf } for pid=4853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:37.944000 audit[4853]: AVC avc: denied { perfmon } for pid=4853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:37.944000 audit[4853]: AVC avc: denied { perfmon } for pid=4853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:37.944000 audit[4853]: AVC avc: denied { perfmon } for pid=4853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:37.944000 audit[4853]: AVC avc: denied { perfmon } for pid=4853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:37.944000 audit[4853]: AVC avc: denied { perfmon } for pid=4853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:37.944000 audit[4853]: AVC avc: denied { bpf } for pid=4853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:37.944000 audit[4853]: AVC avc: denied { bpf } for pid=4853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:37.944000 audit: BPF prog-id=178 op=LOAD Dec 13 14:15:37.944000 audit[4853]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4836 pid=4853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:37.944000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631663565663532613766616635343463313663626131643365363533 Dec 13 14:15:37.945000 audit: BPF prog-id=178 op=UNLOAD Dec 13 14:15:37.945000 audit: BPF prog-id=177 op=UNLOAD Dec 13 14:15:37.945000 audit[4853]: AVC avc: denied { bpf } for pid=4853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:37.945000 audit[4853]: AVC avc: denied { bpf } for pid=4853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:37.945000 audit[4853]: AVC avc: denied { bpf } for pid=4853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:37.945000 audit[4853]: AVC avc: denied { perfmon } for pid=4853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:37.945000 audit[4853]: AVC avc: denied { perfmon } for pid=4853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:37.945000 audit[4853]: AVC avc: denied { perfmon } for pid=4853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:37.945000 audit[4853]: AVC avc: denied { perfmon } for pid=4853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:37.945000 audit[4853]: AVC avc: denied { perfmon } for pid=4853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:37.945000 audit[4853]: AVC avc: denied { bpf } for pid=4853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:37.945000 audit[4853]: AVC avc: denied { bpf } for pid=4853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:37.945000 audit: BPF prog-id=179 op=LOAD Dec 13 14:15:37.945000 audit[4853]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4836 pid=4853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:37.945000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631663565663532613766616635343463313663626131643365363533 Dec 13 14:15:37.979000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:37.979000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:37.979000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:37.979000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:37.979000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:37.979000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:37.979000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:37.979000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:37.979000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:37.980000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:37.980000 audit: BPF prog-id=180 op=LOAD Dec 13 14:15:37.983000 audit[4899]: AVC avc: denied { bpf } for pid=4899 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:37.983000 audit[4899]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4883 pid=4899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:37.983000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035656632626165373565633966393363323463316132393563653364 Dec 13 14:15:37.985000 audit[4899]: AVC avc: denied { perfmon } for pid=4899 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:37.985000 audit[4899]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4883 pid=4899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:37.985000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035656632626165373565633966393363323463316132393563653364 Dec 13 14:15:37.985000 audit[4899]: AVC avc: denied { bpf } for pid=4899 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:37.985000 audit[4899]: AVC avc: denied { bpf } for pid=4899 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:37.985000 audit[4899]: AVC avc: denied { bpf } for pid=4899 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:37.985000 audit[4899]: AVC avc: denied { perfmon } for pid=4899 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:37.985000 audit[4899]: AVC avc: denied { perfmon } for pid=4899 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:37.985000 audit[4899]: AVC avc: denied { perfmon } for pid=4899 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:37.985000 audit[4899]: AVC avc: denied { perfmon } for pid=4899 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:37.985000 audit[4899]: AVC avc: denied { perfmon } for pid=4899 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:37.985000 audit[4899]: AVC avc: denied { bpf } for pid=4899 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:37.985000 audit[4899]: AVC avc: denied { bpf } for pid=4899 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:37.985000 audit: BPF prog-id=181 op=LOAD Dec 13 14:15:37.985000 audit[4899]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4883 pid=4899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:37.985000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035656632626165373565633966393363323463316132393563653364 Dec 13 14:15:37.987000 audit[4899]: AVC avc: denied { bpf } for pid=4899 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:37.987000 audit[4899]: AVC avc: denied { bpf } for pid=4899 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:37.987000 audit[4899]: AVC avc: denied { perfmon } for pid=4899 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:37.987000 audit[4899]: AVC avc: denied { perfmon } for pid=4899 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:37.987000 audit[4899]: AVC avc: denied { perfmon } for pid=4899 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:37.987000 audit[4899]: AVC avc: denied { perfmon } for pid=4899 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:37.987000 audit[4899]: AVC avc: denied { perfmon } for pid=4899 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:37.987000 audit[4899]: AVC avc: denied { bpf } for pid=4899 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:37.987000 audit[4899]: AVC avc: denied { bpf } for pid=4899 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:37.987000 audit: BPF prog-id=182 op=LOAD Dec 13 14:15:37.987000 audit[4899]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4883 pid=4899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:37.987000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035656632626165373565633966393363323463316132393563653364 Dec 13 14:15:37.988000 audit: BPF prog-id=182 op=UNLOAD Dec 13 14:15:37.989000 audit: BPF prog-id=181 op=UNLOAD Dec 13 14:15:37.989000 audit[4899]: AVC avc: denied { bpf } for pid=4899 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:37.989000 audit[4899]: AVC avc: denied { bpf } for pid=4899 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:37.989000 audit[4899]: AVC avc: denied { bpf } for pid=4899 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:37.989000 audit[4899]: AVC avc: denied { perfmon } for pid=4899 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:37.989000 audit[4899]: AVC avc: denied { perfmon } for pid=4899 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:37.989000 audit[4899]: AVC avc: denied { perfmon } for pid=4899 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:37.989000 audit[4899]: AVC avc: denied { perfmon } for pid=4899 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:37.989000 audit[4899]: AVC avc: denied { perfmon } for pid=4899 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:37.989000 audit[4899]: AVC avc: denied { bpf } for pid=4899 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:37.989000 audit[4899]: AVC avc: denied { bpf } for pid=4899 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:37.989000 audit: BPF prog-id=183 op=LOAD Dec 13 14:15:37.989000 audit[4899]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4883 pid=4899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:37.989000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035656632626165373565633966393363323463316132393563653364 Dec 13 14:15:38.055516 env[1818]: time="2024-12-13T14:15:38.055459536Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-r2mtx,Uid:598fbb62-2ff1-4c40-b8a5-720bd020a409,Namespace:calico-system,Attempt:1,} returns sandbox id \"61f5ef52a7faf544c16cba1d3e653763ad2a02a602e536a9835ac431621518ae\"" Dec 13 14:15:38.161698 env[1818]: time="2024-12-13T14:15:38.155924544Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-747dd4679c-kfxmw,Uid:55f96ceb-5c45-4365-b359-551ac19183ea,Namespace:calico-system,Attempt:1,} returns sandbox id \"05ef2bae75ec9f93c24c1a295ce3d26c07052bc4cf87733e4585b99bccd7f077\"" Dec 13 14:15:38.173772 env[1818]: 2024-12-13 14:15:37.887 [INFO][4837] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="fd62489a291fe65369fc57679c6a79016dcb022de2a65ff0cb240039c436bada" Dec 13 14:15:38.173772 env[1818]: 2024-12-13 14:15:37.887 [INFO][4837] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="fd62489a291fe65369fc57679c6a79016dcb022de2a65ff0cb240039c436bada" iface="eth0" netns="/var/run/netns/cni-efcb2fce-e06f-93e2-dd28-4f008102e373" Dec 13 14:15:38.173772 env[1818]: 2024-12-13 14:15:37.888 [INFO][4837] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="fd62489a291fe65369fc57679c6a79016dcb022de2a65ff0cb240039c436bada" iface="eth0" netns="/var/run/netns/cni-efcb2fce-e06f-93e2-dd28-4f008102e373" Dec 13 14:15:38.173772 env[1818]: 2024-12-13 14:15:37.889 [INFO][4837] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="fd62489a291fe65369fc57679c6a79016dcb022de2a65ff0cb240039c436bada" iface="eth0" netns="/var/run/netns/cni-efcb2fce-e06f-93e2-dd28-4f008102e373" Dec 13 14:15:38.173772 env[1818]: 2024-12-13 14:15:37.889 [INFO][4837] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="fd62489a291fe65369fc57679c6a79016dcb022de2a65ff0cb240039c436bada" Dec 13 14:15:38.173772 env[1818]: 2024-12-13 14:15:37.890 [INFO][4837] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="fd62489a291fe65369fc57679c6a79016dcb022de2a65ff0cb240039c436bada" Dec 13 14:15:38.173772 env[1818]: 2024-12-13 14:15:38.133 [INFO][4914] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="fd62489a291fe65369fc57679c6a79016dcb022de2a65ff0cb240039c436bada" HandleID="k8s-pod-network.fd62489a291fe65369fc57679c6a79016dcb022de2a65ff0cb240039c436bada" Workload="ip--172--31--18--231-k8s-calico--apiserver--8878db5b5--czf6j-eth0" Dec 13 14:15:38.173772 env[1818]: 2024-12-13 14:15:38.133 [INFO][4914] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:15:38.173772 env[1818]: 2024-12-13 14:15:38.133 [INFO][4914] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:15:38.173772 env[1818]: 2024-12-13 14:15:38.150 [WARNING][4914] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="fd62489a291fe65369fc57679c6a79016dcb022de2a65ff0cb240039c436bada" HandleID="k8s-pod-network.fd62489a291fe65369fc57679c6a79016dcb022de2a65ff0cb240039c436bada" Workload="ip--172--31--18--231-k8s-calico--apiserver--8878db5b5--czf6j-eth0" Dec 13 14:15:38.173772 env[1818]: 2024-12-13 14:15:38.150 [INFO][4914] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="fd62489a291fe65369fc57679c6a79016dcb022de2a65ff0cb240039c436bada" HandleID="k8s-pod-network.fd62489a291fe65369fc57679c6a79016dcb022de2a65ff0cb240039c436bada" Workload="ip--172--31--18--231-k8s-calico--apiserver--8878db5b5--czf6j-eth0" Dec 13 14:15:38.173772 env[1818]: 2024-12-13 14:15:38.162 [INFO][4914] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:15:38.173772 env[1818]: 2024-12-13 14:15:38.170 [INFO][4837] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="fd62489a291fe65369fc57679c6a79016dcb022de2a65ff0cb240039c436bada" Dec 13 14:15:38.179793 env[1818]: time="2024-12-13T14:15:38.179721329Z" level=info msg="TearDown network for sandbox \"fd62489a291fe65369fc57679c6a79016dcb022de2a65ff0cb240039c436bada\" successfully" Dec 13 14:15:38.180031 env[1818]: time="2024-12-13T14:15:38.179990892Z" level=info msg="StopPodSandbox for \"fd62489a291fe65369fc57679c6a79016dcb022de2a65ff0cb240039c436bada\" returns successfully" Dec 13 14:15:38.180725 systemd[1]: run-netns-cni\x2defcb2fce\x2de06f\x2d93e2\x2ddd28\x2d4f008102e373.mount: Deactivated successfully. Dec 13 14:15:38.186720 env[1818]: time="2024-12-13T14:15:38.186653964Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-8878db5b5-czf6j,Uid:8da61845-6202-427b-9fcf-1b4b4a040aed,Namespace:calico-apiserver,Attempt:1,}" Dec 13 14:15:38.205131 env[1818]: 2024-12-13 14:15:37.914 [INFO][4845] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="4efd2f0a680ad6d670ab93646b15d79ac1cbbc75b8e87abe3d3d6dcab3115dfa" Dec 13 14:15:38.205131 env[1818]: 2024-12-13 14:15:37.914 [INFO][4845] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="4efd2f0a680ad6d670ab93646b15d79ac1cbbc75b8e87abe3d3d6dcab3115dfa" iface="eth0" netns="/var/run/netns/cni-641358a4-3f8e-9560-101f-2866ed944e68" Dec 13 14:15:38.205131 env[1818]: 2024-12-13 14:15:37.914 [INFO][4845] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="4efd2f0a680ad6d670ab93646b15d79ac1cbbc75b8e87abe3d3d6dcab3115dfa" iface="eth0" netns="/var/run/netns/cni-641358a4-3f8e-9560-101f-2866ed944e68" Dec 13 14:15:38.205131 env[1818]: 2024-12-13 14:15:37.915 [INFO][4845] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="4efd2f0a680ad6d670ab93646b15d79ac1cbbc75b8e87abe3d3d6dcab3115dfa" iface="eth0" netns="/var/run/netns/cni-641358a4-3f8e-9560-101f-2866ed944e68" Dec 13 14:15:38.205131 env[1818]: 2024-12-13 14:15:37.915 [INFO][4845] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="4efd2f0a680ad6d670ab93646b15d79ac1cbbc75b8e87abe3d3d6dcab3115dfa" Dec 13 14:15:38.205131 env[1818]: 2024-12-13 14:15:37.915 [INFO][4845] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="4efd2f0a680ad6d670ab93646b15d79ac1cbbc75b8e87abe3d3d6dcab3115dfa" Dec 13 14:15:38.205131 env[1818]: 2024-12-13 14:15:38.156 [INFO][4917] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="4efd2f0a680ad6d670ab93646b15d79ac1cbbc75b8e87abe3d3d6dcab3115dfa" HandleID="k8s-pod-network.4efd2f0a680ad6d670ab93646b15d79ac1cbbc75b8e87abe3d3d6dcab3115dfa" Workload="ip--172--31--18--231-k8s-coredns--76f75df574--hzf8c-eth0" Dec 13 14:15:38.205131 env[1818]: 2024-12-13 14:15:38.156 [INFO][4917] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:15:38.205131 env[1818]: 2024-12-13 14:15:38.164 [INFO][4917] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:15:38.205131 env[1818]: 2024-12-13 14:15:38.192 [WARNING][4917] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="4efd2f0a680ad6d670ab93646b15d79ac1cbbc75b8e87abe3d3d6dcab3115dfa" HandleID="k8s-pod-network.4efd2f0a680ad6d670ab93646b15d79ac1cbbc75b8e87abe3d3d6dcab3115dfa" Workload="ip--172--31--18--231-k8s-coredns--76f75df574--hzf8c-eth0" Dec 13 14:15:38.205131 env[1818]: 2024-12-13 14:15:38.192 [INFO][4917] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="4efd2f0a680ad6d670ab93646b15d79ac1cbbc75b8e87abe3d3d6dcab3115dfa" HandleID="k8s-pod-network.4efd2f0a680ad6d670ab93646b15d79ac1cbbc75b8e87abe3d3d6dcab3115dfa" Workload="ip--172--31--18--231-k8s-coredns--76f75df574--hzf8c-eth0" Dec 13 14:15:38.205131 env[1818]: 2024-12-13 14:15:38.196 [INFO][4917] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:15:38.205131 env[1818]: 2024-12-13 14:15:38.200 [INFO][4845] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="4efd2f0a680ad6d670ab93646b15d79ac1cbbc75b8e87abe3d3d6dcab3115dfa" Dec 13 14:15:38.217160 systemd[1]: run-netns-cni\x2d641358a4\x2d3f8e\x2d9560\x2d101f\x2d2866ed944e68.mount: Deactivated successfully. Dec 13 14:15:38.218812 env[1818]: time="2024-12-13T14:15:38.218610640Z" level=info msg="TearDown network for sandbox \"4efd2f0a680ad6d670ab93646b15d79ac1cbbc75b8e87abe3d3d6dcab3115dfa\" successfully" Dec 13 14:15:38.218812 env[1818]: time="2024-12-13T14:15:38.218776268Z" level=info msg="StopPodSandbox for \"4efd2f0a680ad6d670ab93646b15d79ac1cbbc75b8e87abe3d3d6dcab3115dfa\" returns successfully" Dec 13 14:15:38.224531 env[1818]: time="2024-12-13T14:15:38.224463825Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-hzf8c,Uid:07b86ac8-84b4-4807-aaee-92f8a5bbaa89,Namespace:kube-system,Attempt:1,}" Dec 13 14:15:38.569218 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:15:38.569904 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali46876c96326: link becomes ready Dec 13 14:15:38.569805 systemd-networkd[1540]: cali46876c96326: Link UP Dec 13 14:15:38.570240 systemd-networkd[1540]: cali46876c96326: Gained carrier Dec 13 14:15:38.618172 env[1818]: 2024-12-13 14:15:38.347 [INFO][4953] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--18--231-k8s-calico--apiserver--8878db5b5--czf6j-eth0 calico-apiserver-8878db5b5- calico-apiserver 8da61845-6202-427b-9fcf-1b4b4a040aed 880 0 2024-12-13 14:15:05 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:8878db5b5 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ip-172-31-18-231 calico-apiserver-8878db5b5-czf6j eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali46876c96326 [] []}} ContainerID="2d2df5a0e8b4776829a72158aecfad755a90a20eb96a273f1f00f58b646e262c" Namespace="calico-apiserver" Pod="calico-apiserver-8878db5b5-czf6j" WorkloadEndpoint="ip--172--31--18--231-k8s-calico--apiserver--8878db5b5--czf6j-" Dec 13 14:15:38.618172 env[1818]: 2024-12-13 14:15:38.347 [INFO][4953] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="2d2df5a0e8b4776829a72158aecfad755a90a20eb96a273f1f00f58b646e262c" Namespace="calico-apiserver" Pod="calico-apiserver-8878db5b5-czf6j" WorkloadEndpoint="ip--172--31--18--231-k8s-calico--apiserver--8878db5b5--czf6j-eth0" Dec 13 14:15:38.618172 env[1818]: 2024-12-13 14:15:38.456 [INFO][4975] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="2d2df5a0e8b4776829a72158aecfad755a90a20eb96a273f1f00f58b646e262c" HandleID="k8s-pod-network.2d2df5a0e8b4776829a72158aecfad755a90a20eb96a273f1f00f58b646e262c" Workload="ip--172--31--18--231-k8s-calico--apiserver--8878db5b5--czf6j-eth0" Dec 13 14:15:38.618172 env[1818]: 2024-12-13 14:15:38.486 [INFO][4975] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="2d2df5a0e8b4776829a72158aecfad755a90a20eb96a273f1f00f58b646e262c" HandleID="k8s-pod-network.2d2df5a0e8b4776829a72158aecfad755a90a20eb96a273f1f00f58b646e262c" Workload="ip--172--31--18--231-k8s-calico--apiserver--8878db5b5--czf6j-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000332e50), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ip-172-31-18-231", "pod":"calico-apiserver-8878db5b5-czf6j", "timestamp":"2024-12-13 14:15:38.45654723 +0000 UTC"}, Hostname:"ip-172-31-18-231", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:15:38.618172 env[1818]: 2024-12-13 14:15:38.486 [INFO][4975] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:15:38.618172 env[1818]: 2024-12-13 14:15:38.486 [INFO][4975] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:15:38.618172 env[1818]: 2024-12-13 14:15:38.486 [INFO][4975] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-18-231' Dec 13 14:15:38.618172 env[1818]: 2024-12-13 14:15:38.489 [INFO][4975] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.2d2df5a0e8b4776829a72158aecfad755a90a20eb96a273f1f00f58b646e262c" host="ip-172-31-18-231" Dec 13 14:15:38.618172 env[1818]: 2024-12-13 14:15:38.501 [INFO][4975] ipam/ipam.go 372: Looking up existing affinities for host host="ip-172-31-18-231" Dec 13 14:15:38.618172 env[1818]: 2024-12-13 14:15:38.513 [INFO][4975] ipam/ipam.go 489: Trying affinity for 192.168.34.128/26 host="ip-172-31-18-231" Dec 13 14:15:38.618172 env[1818]: 2024-12-13 14:15:38.517 [INFO][4975] ipam/ipam.go 155: Attempting to load block cidr=192.168.34.128/26 host="ip-172-31-18-231" Dec 13 14:15:38.618172 env[1818]: 2024-12-13 14:15:38.523 [INFO][4975] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.34.128/26 host="ip-172-31-18-231" Dec 13 14:15:38.618172 env[1818]: 2024-12-13 14:15:38.523 [INFO][4975] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.34.128/26 handle="k8s-pod-network.2d2df5a0e8b4776829a72158aecfad755a90a20eb96a273f1f00f58b646e262c" host="ip-172-31-18-231" Dec 13 14:15:38.618172 env[1818]: 2024-12-13 14:15:38.527 [INFO][4975] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.2d2df5a0e8b4776829a72158aecfad755a90a20eb96a273f1f00f58b646e262c Dec 13 14:15:38.618172 env[1818]: 2024-12-13 14:15:38.537 [INFO][4975] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.34.128/26 handle="k8s-pod-network.2d2df5a0e8b4776829a72158aecfad755a90a20eb96a273f1f00f58b646e262c" host="ip-172-31-18-231" Dec 13 14:15:38.618172 env[1818]: 2024-12-13 14:15:38.550 [INFO][4975] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.34.133/26] block=192.168.34.128/26 handle="k8s-pod-network.2d2df5a0e8b4776829a72158aecfad755a90a20eb96a273f1f00f58b646e262c" host="ip-172-31-18-231" Dec 13 14:15:38.618172 env[1818]: 2024-12-13 14:15:38.550 [INFO][4975] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.34.133/26] handle="k8s-pod-network.2d2df5a0e8b4776829a72158aecfad755a90a20eb96a273f1f00f58b646e262c" host="ip-172-31-18-231" Dec 13 14:15:38.618172 env[1818]: 2024-12-13 14:15:38.550 [INFO][4975] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:15:38.618172 env[1818]: 2024-12-13 14:15:38.551 [INFO][4975] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.34.133/26] IPv6=[] ContainerID="2d2df5a0e8b4776829a72158aecfad755a90a20eb96a273f1f00f58b646e262c" HandleID="k8s-pod-network.2d2df5a0e8b4776829a72158aecfad755a90a20eb96a273f1f00f58b646e262c" Workload="ip--172--31--18--231-k8s-calico--apiserver--8878db5b5--czf6j-eth0" Dec 13 14:15:38.619578 env[1818]: 2024-12-13 14:15:38.554 [INFO][4953] cni-plugin/k8s.go 386: Populated endpoint ContainerID="2d2df5a0e8b4776829a72158aecfad755a90a20eb96a273f1f00f58b646e262c" Namespace="calico-apiserver" Pod="calico-apiserver-8878db5b5-czf6j" WorkloadEndpoint="ip--172--31--18--231-k8s-calico--apiserver--8878db5b5--czf6j-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--18--231-k8s-calico--apiserver--8878db5b5--czf6j-eth0", GenerateName:"calico-apiserver-8878db5b5-", Namespace:"calico-apiserver", SelfLink:"", UID:"8da61845-6202-427b-9fcf-1b4b4a040aed", ResourceVersion:"880", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 15, 5, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"8878db5b5", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-18-231", ContainerID:"", Pod:"calico-apiserver-8878db5b5-czf6j", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.34.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali46876c96326", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:15:38.619578 env[1818]: 2024-12-13 14:15:38.555 [INFO][4953] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.34.133/32] ContainerID="2d2df5a0e8b4776829a72158aecfad755a90a20eb96a273f1f00f58b646e262c" Namespace="calico-apiserver" Pod="calico-apiserver-8878db5b5-czf6j" WorkloadEndpoint="ip--172--31--18--231-k8s-calico--apiserver--8878db5b5--czf6j-eth0" Dec 13 14:15:38.619578 env[1818]: 2024-12-13 14:15:38.556 [INFO][4953] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali46876c96326 ContainerID="2d2df5a0e8b4776829a72158aecfad755a90a20eb96a273f1f00f58b646e262c" Namespace="calico-apiserver" Pod="calico-apiserver-8878db5b5-czf6j" WorkloadEndpoint="ip--172--31--18--231-k8s-calico--apiserver--8878db5b5--czf6j-eth0" Dec 13 14:15:38.619578 env[1818]: 2024-12-13 14:15:38.575 [INFO][4953] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="2d2df5a0e8b4776829a72158aecfad755a90a20eb96a273f1f00f58b646e262c" Namespace="calico-apiserver" Pod="calico-apiserver-8878db5b5-czf6j" WorkloadEndpoint="ip--172--31--18--231-k8s-calico--apiserver--8878db5b5--czf6j-eth0" Dec 13 14:15:38.619578 env[1818]: 2024-12-13 14:15:38.576 [INFO][4953] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="2d2df5a0e8b4776829a72158aecfad755a90a20eb96a273f1f00f58b646e262c" Namespace="calico-apiserver" Pod="calico-apiserver-8878db5b5-czf6j" WorkloadEndpoint="ip--172--31--18--231-k8s-calico--apiserver--8878db5b5--czf6j-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--18--231-k8s-calico--apiserver--8878db5b5--czf6j-eth0", GenerateName:"calico-apiserver-8878db5b5-", Namespace:"calico-apiserver", SelfLink:"", UID:"8da61845-6202-427b-9fcf-1b4b4a040aed", ResourceVersion:"880", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 15, 5, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"8878db5b5", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-18-231", ContainerID:"2d2df5a0e8b4776829a72158aecfad755a90a20eb96a273f1f00f58b646e262c", Pod:"calico-apiserver-8878db5b5-czf6j", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.34.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali46876c96326", MAC:"76:2e:22:70:2e:15", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:15:38.619578 env[1818]: 2024-12-13 14:15:38.609 [INFO][4953] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="2d2df5a0e8b4776829a72158aecfad755a90a20eb96a273f1f00f58b646e262c" Namespace="calico-apiserver" Pod="calico-apiserver-8878db5b5-czf6j" WorkloadEndpoint="ip--172--31--18--231-k8s-calico--apiserver--8878db5b5--czf6j-eth0" Dec 13 14:15:38.659331 env[1818]: time="2024-12-13T14:15:38.659207146Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:15:38.659681 env[1818]: time="2024-12-13T14:15:38.659627288Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:15:38.659890 env[1818]: time="2024-12-13T14:15:38.659841361Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:15:38.660709 env[1818]: time="2024-12-13T14:15:38.660602707Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2d2df5a0e8b4776829a72158aecfad755a90a20eb96a273f1f00f58b646e262c pid=5009 runtime=io.containerd.runc.v2 Dec 13 14:15:38.682088 systemd-networkd[1540]: calic913a7d0c6c: Link UP Dec 13 14:15:38.688893 systemd-networkd[1540]: calic913a7d0c6c: Gained carrier Dec 13 14:15:38.690826 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calic913a7d0c6c: link becomes ready Dec 13 14:15:38.702614 systemd-networkd[1540]: cali05ba6d11cd5: Gained IPv6LL Dec 13 14:15:38.734853 env[1818]: 2024-12-13 14:15:38.401 [INFO][4963] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ip--172--31--18--231-k8s-coredns--76f75df574--hzf8c-eth0 coredns-76f75df574- kube-system 07b86ac8-84b4-4807-aaee-92f8a5bbaa89 882 0 2024-12-13 14:14:55 +0000 UTC map[k8s-app:kube-dns pod-template-hash:76f75df574 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ip-172-31-18-231 coredns-76f75df574-hzf8c eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calic913a7d0c6c [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="ed6cc4060a12c8838c8efd26bb973811a77e13d770eb292c66fe7a7ac3b933d1" Namespace="kube-system" Pod="coredns-76f75df574-hzf8c" WorkloadEndpoint="ip--172--31--18--231-k8s-coredns--76f75df574--hzf8c-" Dec 13 14:15:38.734853 env[1818]: 2024-12-13 14:15:38.401 [INFO][4963] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="ed6cc4060a12c8838c8efd26bb973811a77e13d770eb292c66fe7a7ac3b933d1" Namespace="kube-system" Pod="coredns-76f75df574-hzf8c" WorkloadEndpoint="ip--172--31--18--231-k8s-coredns--76f75df574--hzf8c-eth0" Dec 13 14:15:38.734853 env[1818]: 2024-12-13 14:15:38.497 [INFO][4980] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="ed6cc4060a12c8838c8efd26bb973811a77e13d770eb292c66fe7a7ac3b933d1" HandleID="k8s-pod-network.ed6cc4060a12c8838c8efd26bb973811a77e13d770eb292c66fe7a7ac3b933d1" Workload="ip--172--31--18--231-k8s-coredns--76f75df574--hzf8c-eth0" Dec 13 14:15:38.734853 env[1818]: 2024-12-13 14:15:38.534 [INFO][4980] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="ed6cc4060a12c8838c8efd26bb973811a77e13d770eb292c66fe7a7ac3b933d1" HandleID="k8s-pod-network.ed6cc4060a12c8838c8efd26bb973811a77e13d770eb292c66fe7a7ac3b933d1" Workload="ip--172--31--18--231-k8s-coredns--76f75df574--hzf8c-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002a0ac0), Attrs:map[string]string{"namespace":"kube-system", "node":"ip-172-31-18-231", "pod":"coredns-76f75df574-hzf8c", "timestamp":"2024-12-13 14:15:38.497916446 +0000 UTC"}, Hostname:"ip-172-31-18-231", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:15:38.734853 env[1818]: 2024-12-13 14:15:38.534 [INFO][4980] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:15:38.734853 env[1818]: 2024-12-13 14:15:38.550 [INFO][4980] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:15:38.734853 env[1818]: 2024-12-13 14:15:38.550 [INFO][4980] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ip-172-31-18-231' Dec 13 14:15:38.734853 env[1818]: 2024-12-13 14:15:38.556 [INFO][4980] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.ed6cc4060a12c8838c8efd26bb973811a77e13d770eb292c66fe7a7ac3b933d1" host="ip-172-31-18-231" Dec 13 14:15:38.734853 env[1818]: 2024-12-13 14:15:38.580 [INFO][4980] ipam/ipam.go 372: Looking up existing affinities for host host="ip-172-31-18-231" Dec 13 14:15:38.734853 env[1818]: 2024-12-13 14:15:38.614 [INFO][4980] ipam/ipam.go 489: Trying affinity for 192.168.34.128/26 host="ip-172-31-18-231" Dec 13 14:15:38.734853 env[1818]: 2024-12-13 14:15:38.618 [INFO][4980] ipam/ipam.go 155: Attempting to load block cidr=192.168.34.128/26 host="ip-172-31-18-231" Dec 13 14:15:38.734853 env[1818]: 2024-12-13 14:15:38.623 [INFO][4980] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.34.128/26 host="ip-172-31-18-231" Dec 13 14:15:38.734853 env[1818]: 2024-12-13 14:15:38.623 [INFO][4980] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.34.128/26 handle="k8s-pod-network.ed6cc4060a12c8838c8efd26bb973811a77e13d770eb292c66fe7a7ac3b933d1" host="ip-172-31-18-231" Dec 13 14:15:38.734853 env[1818]: 2024-12-13 14:15:38.629 [INFO][4980] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.ed6cc4060a12c8838c8efd26bb973811a77e13d770eb292c66fe7a7ac3b933d1 Dec 13 14:15:38.734853 env[1818]: 2024-12-13 14:15:38.646 [INFO][4980] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.34.128/26 handle="k8s-pod-network.ed6cc4060a12c8838c8efd26bb973811a77e13d770eb292c66fe7a7ac3b933d1" host="ip-172-31-18-231" Dec 13 14:15:38.734853 env[1818]: 2024-12-13 14:15:38.664 [INFO][4980] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.34.134/26] block=192.168.34.128/26 handle="k8s-pod-network.ed6cc4060a12c8838c8efd26bb973811a77e13d770eb292c66fe7a7ac3b933d1" host="ip-172-31-18-231" Dec 13 14:15:38.734853 env[1818]: 2024-12-13 14:15:38.664 [INFO][4980] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.34.134/26] handle="k8s-pod-network.ed6cc4060a12c8838c8efd26bb973811a77e13d770eb292c66fe7a7ac3b933d1" host="ip-172-31-18-231" Dec 13 14:15:38.734853 env[1818]: 2024-12-13 14:15:38.665 [INFO][4980] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:15:38.734853 env[1818]: 2024-12-13 14:15:38.665 [INFO][4980] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.34.134/26] IPv6=[] ContainerID="ed6cc4060a12c8838c8efd26bb973811a77e13d770eb292c66fe7a7ac3b933d1" HandleID="k8s-pod-network.ed6cc4060a12c8838c8efd26bb973811a77e13d770eb292c66fe7a7ac3b933d1" Workload="ip--172--31--18--231-k8s-coredns--76f75df574--hzf8c-eth0" Dec 13 14:15:38.736263 env[1818]: 2024-12-13 14:15:38.668 [INFO][4963] cni-plugin/k8s.go 386: Populated endpoint ContainerID="ed6cc4060a12c8838c8efd26bb973811a77e13d770eb292c66fe7a7ac3b933d1" Namespace="kube-system" Pod="coredns-76f75df574-hzf8c" WorkloadEndpoint="ip--172--31--18--231-k8s-coredns--76f75df574--hzf8c-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--18--231-k8s-coredns--76f75df574--hzf8c-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"07b86ac8-84b4-4807-aaee-92f8a5bbaa89", ResourceVersion:"882", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 14, 55, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-18-231", ContainerID:"", Pod:"coredns-76f75df574-hzf8c", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.34.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calic913a7d0c6c", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:15:38.736263 env[1818]: 2024-12-13 14:15:38.669 [INFO][4963] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.34.134/32] ContainerID="ed6cc4060a12c8838c8efd26bb973811a77e13d770eb292c66fe7a7ac3b933d1" Namespace="kube-system" Pod="coredns-76f75df574-hzf8c" WorkloadEndpoint="ip--172--31--18--231-k8s-coredns--76f75df574--hzf8c-eth0" Dec 13 14:15:38.736263 env[1818]: 2024-12-13 14:15:38.669 [INFO][4963] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calic913a7d0c6c ContainerID="ed6cc4060a12c8838c8efd26bb973811a77e13d770eb292c66fe7a7ac3b933d1" Namespace="kube-system" Pod="coredns-76f75df574-hzf8c" WorkloadEndpoint="ip--172--31--18--231-k8s-coredns--76f75df574--hzf8c-eth0" Dec 13 14:15:38.736263 env[1818]: 2024-12-13 14:15:38.690 [INFO][4963] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="ed6cc4060a12c8838c8efd26bb973811a77e13d770eb292c66fe7a7ac3b933d1" Namespace="kube-system" Pod="coredns-76f75df574-hzf8c" WorkloadEndpoint="ip--172--31--18--231-k8s-coredns--76f75df574--hzf8c-eth0" Dec 13 14:15:38.736263 env[1818]: 2024-12-13 14:15:38.696 [INFO][4963] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="ed6cc4060a12c8838c8efd26bb973811a77e13d770eb292c66fe7a7ac3b933d1" Namespace="kube-system" Pod="coredns-76f75df574-hzf8c" WorkloadEndpoint="ip--172--31--18--231-k8s-coredns--76f75df574--hzf8c-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--18--231-k8s-coredns--76f75df574--hzf8c-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"07b86ac8-84b4-4807-aaee-92f8a5bbaa89", ResourceVersion:"882", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 14, 55, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-18-231", ContainerID:"ed6cc4060a12c8838c8efd26bb973811a77e13d770eb292c66fe7a7ac3b933d1", Pod:"coredns-76f75df574-hzf8c", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.34.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calic913a7d0c6c", MAC:"9a:17:3c:c2:5e:a0", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:15:38.736263 env[1818]: 2024-12-13 14:15:38.731 [INFO][4963] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="ed6cc4060a12c8838c8efd26bb973811a77e13d770eb292c66fe7a7ac3b933d1" Namespace="kube-system" Pod="coredns-76f75df574-hzf8c" WorkloadEndpoint="ip--172--31--18--231-k8s-coredns--76f75df574--hzf8c-eth0" Dec 13 14:15:38.734000 audit[5025]: NETFILTER_CFG table=filter:109 family=2 entries=42 op=nft_register_chain pid=5025 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:15:38.734000 audit[5025]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=22688 a0=3 a1=ffffe27dfc90 a2=0 a3=ffffb686dfa8 items=0 ppid=4258 pid=5025 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:38.734000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:15:38.752744 systemd[1]: Started cri-containerd-2d2df5a0e8b4776829a72158aecfad755a90a20eb96a273f1f00f58b646e262c.scope. Dec 13 14:15:38.818000 audit[5037]: NETFILTER_CFG table=filter:110 family=2 entries=48 op=nft_register_chain pid=5037 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:15:38.835131 env[1818]: time="2024-12-13T14:15:38.828883559Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:15:38.835131 env[1818]: time="2024-12-13T14:15:38.829041914Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:15:38.835131 env[1818]: time="2024-12-13T14:15:38.829085475Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:15:38.835131 env[1818]: time="2024-12-13T14:15:38.829360198Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ed6cc4060a12c8838c8efd26bb973811a77e13d770eb292c66fe7a7ac3b933d1 pid=5049 runtime=io.containerd.runc.v2 Dec 13 14:15:38.818000 audit[5037]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=23432 a0=3 a1=ffffef8fbee0 a2=0 a3=ffff7fc01fa8 items=0 ppid=4258 pid=5037 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:38.818000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:15:38.871000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:38.871000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:38.871000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:38.871000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:38.871000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:38.871000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:38.871000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:38.871000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:38.871000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:38.871000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:38.871000 audit: BPF prog-id=184 op=LOAD Dec 13 14:15:38.873000 audit[5021]: AVC avc: denied { bpf } for pid=5021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:38.873000 audit[5021]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=5009 pid=5021 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:38.873000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264326466356130653862343737363832396137323135386165636661 Dec 13 14:15:38.874000 audit[5021]: AVC avc: denied { perfmon } for pid=5021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:38.874000 audit[5021]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=5009 pid=5021 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:38.874000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264326466356130653862343737363832396137323135386165636661 Dec 13 14:15:38.874000 audit[5021]: AVC avc: denied { bpf } for pid=5021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:38.874000 audit[5021]: AVC avc: denied { bpf } for pid=5021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:38.874000 audit[5021]: AVC avc: denied { bpf } for pid=5021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:38.874000 audit[5021]: AVC avc: denied { perfmon } for pid=5021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:38.874000 audit[5021]: AVC avc: denied { perfmon } for pid=5021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:38.874000 audit[5021]: AVC avc: denied { perfmon } for pid=5021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:38.874000 audit[5021]: AVC avc: denied { perfmon } for pid=5021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:38.874000 audit[5021]: AVC avc: denied { perfmon } for pid=5021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:38.874000 audit[5021]: AVC avc: denied { bpf } for pid=5021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:38.874000 audit[5021]: AVC avc: denied { bpf } for pid=5021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:38.874000 audit: BPF prog-id=185 op=LOAD Dec 13 14:15:38.874000 audit[5021]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=5009 pid=5021 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:38.874000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264326466356130653862343737363832396137323135386165636661 Dec 13 14:15:38.876000 audit[5021]: AVC avc: denied { bpf } for pid=5021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:38.876000 audit[5021]: AVC avc: denied { bpf } for pid=5021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:38.876000 audit[5021]: AVC avc: denied { perfmon } for pid=5021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:38.876000 audit[5021]: AVC avc: denied { perfmon } for pid=5021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:38.876000 audit[5021]: AVC avc: denied { perfmon } for pid=5021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:38.876000 audit[5021]: AVC avc: denied { perfmon } for pid=5021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:38.876000 audit[5021]: AVC avc: denied { perfmon } for pid=5021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:38.876000 audit[5021]: AVC avc: denied { bpf } for pid=5021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:38.876000 audit[5021]: AVC avc: denied { bpf } for pid=5021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:38.876000 audit: BPF prog-id=186 op=LOAD Dec 13 14:15:38.876000 audit[5021]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=5009 pid=5021 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:38.876000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264326466356130653862343737363832396137323135386165636661 Dec 13 14:15:38.877000 audit: BPF prog-id=186 op=UNLOAD Dec 13 14:15:38.878000 audit: BPF prog-id=185 op=UNLOAD Dec 13 14:15:38.878000 audit[5021]: AVC avc: denied { bpf } for pid=5021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:38.878000 audit[5021]: AVC avc: denied { bpf } for pid=5021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:38.878000 audit[5021]: AVC avc: denied { bpf } for pid=5021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:38.878000 audit[5021]: AVC avc: denied { perfmon } for pid=5021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:38.878000 audit[5021]: AVC avc: denied { perfmon } for pid=5021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:38.878000 audit[5021]: AVC avc: denied { perfmon } for pid=5021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:38.878000 audit[5021]: AVC avc: denied { perfmon } for pid=5021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:38.878000 audit[5021]: AVC avc: denied { perfmon } for pid=5021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:38.878000 audit[5021]: AVC avc: denied { bpf } for pid=5021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:38.878000 audit[5021]: AVC avc: denied { bpf } for pid=5021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:38.878000 audit: BPF prog-id=187 op=LOAD Dec 13 14:15:38.878000 audit[5021]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=5009 pid=5021 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:38.878000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264326466356130653862343737363832396137323135386165636661 Dec 13 14:15:38.951805 systemd[1]: run-containerd-runc-k8s.io-ed6cc4060a12c8838c8efd26bb973811a77e13d770eb292c66fe7a7ac3b933d1-runc.ooU788.mount: Deactivated successfully. Dec 13 14:15:38.966779 systemd[1]: Started cri-containerd-ed6cc4060a12c8838c8efd26bb973811a77e13d770eb292c66fe7a7ac3b933d1.scope. Dec 13 14:15:39.039000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:39.040000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:39.040000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:39.040000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:39.040000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:39.040000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:39.040000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:39.040000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:39.040000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:39.040000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:39.040000 audit: BPF prog-id=188 op=LOAD Dec 13 14:15:39.042000 audit[5066]: AVC avc: denied { bpf } for pid=5066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:39.042000 audit[5066]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=5049 pid=5066 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:39.042000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564366363343036306131326338383338633865666432366262393733 Dec 13 14:15:39.042000 audit[5066]: AVC avc: denied { perfmon } for pid=5066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:39.042000 audit[5066]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=5049 pid=5066 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:39.042000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564366363343036306131326338383338633865666432366262393733 Dec 13 14:15:39.043000 audit[5066]: AVC avc: denied { bpf } for pid=5066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:39.043000 audit[5066]: AVC avc: denied { bpf } for pid=5066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:39.043000 audit[5066]: AVC avc: denied { bpf } for pid=5066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:39.043000 audit[5066]: AVC avc: denied { perfmon } for pid=5066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:39.043000 audit[5066]: AVC avc: denied { perfmon } for pid=5066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:39.043000 audit[5066]: AVC avc: denied { perfmon } for pid=5066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:39.043000 audit[5066]: AVC avc: denied { perfmon } for pid=5066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:39.043000 audit[5066]: AVC avc: denied { perfmon } for pid=5066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:39.043000 audit[5066]: AVC avc: denied { bpf } for pid=5066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:39.043000 audit[5066]: AVC avc: denied { bpf } for pid=5066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:39.043000 audit: BPF prog-id=189 op=LOAD Dec 13 14:15:39.043000 audit[5066]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=5049 pid=5066 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:39.043000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564366363343036306131326338383338633865666432366262393733 Dec 13 14:15:39.045000 audit[5066]: AVC avc: denied { bpf } for pid=5066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:39.045000 audit[5066]: AVC avc: denied { bpf } for pid=5066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:39.045000 audit[5066]: AVC avc: denied { perfmon } for pid=5066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:39.045000 audit[5066]: AVC avc: denied { perfmon } for pid=5066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:39.045000 audit[5066]: AVC avc: denied { perfmon } for pid=5066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:39.045000 audit[5066]: AVC avc: denied { perfmon } for pid=5066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:39.045000 audit[5066]: AVC avc: denied { perfmon } for pid=5066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:39.045000 audit[5066]: AVC avc: denied { bpf } for pid=5066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:39.045000 audit[5066]: AVC avc: denied { bpf } for pid=5066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:39.045000 audit: BPF prog-id=190 op=LOAD Dec 13 14:15:39.045000 audit[5066]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=5049 pid=5066 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:39.045000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564366363343036306131326338383338633865666432366262393733 Dec 13 14:15:39.046000 audit: BPF prog-id=190 op=UNLOAD Dec 13 14:15:39.047000 audit: BPF prog-id=189 op=UNLOAD Dec 13 14:15:39.047000 audit[5066]: AVC avc: denied { bpf } for pid=5066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:39.047000 audit[5066]: AVC avc: denied { bpf } for pid=5066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:39.047000 audit[5066]: AVC avc: denied { bpf } for pid=5066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:39.047000 audit[5066]: AVC avc: denied { perfmon } for pid=5066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:39.047000 audit[5066]: AVC avc: denied { perfmon } for pid=5066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:39.047000 audit[5066]: AVC avc: denied { perfmon } for pid=5066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:39.047000 audit[5066]: AVC avc: denied { perfmon } for pid=5066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:39.047000 audit[5066]: AVC avc: denied { perfmon } for pid=5066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:39.047000 audit[5066]: AVC avc: denied { bpf } for pid=5066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:39.047000 audit[5066]: AVC avc: denied { bpf } for pid=5066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:39.047000 audit: BPF prog-id=191 op=LOAD Dec 13 14:15:39.047000 audit[5066]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=5049 pid=5066 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:39.047000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564366363343036306131326338383338633865666432366262393733 Dec 13 14:15:39.153891 systemd-networkd[1540]: cali52d66785597: Gained IPv6LL Dec 13 14:15:39.190138 env[1818]: time="2024-12-13T14:15:39.190049123Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-hzf8c,Uid:07b86ac8-84b4-4807-aaee-92f8a5bbaa89,Namespace:kube-system,Attempt:1,} returns sandbox id \"ed6cc4060a12c8838c8efd26bb973811a77e13d770eb292c66fe7a7ac3b933d1\"" Dec 13 14:15:39.200067 env[1818]: time="2024-12-13T14:15:39.199971971Z" level=info msg="CreateContainer within sandbox \"ed6cc4060a12c8838c8efd26bb973811a77e13d770eb292c66fe7a7ac3b933d1\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Dec 13 14:15:39.217958 env[1818]: time="2024-12-13T14:15:39.217881602Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-8878db5b5-czf6j,Uid:8da61845-6202-427b-9fcf-1b4b4a040aed,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"2d2df5a0e8b4776829a72158aecfad755a90a20eb96a273f1f00f58b646e262c\"" Dec 13 14:15:39.262194 env[1818]: time="2024-12-13T14:15:39.262117665Z" level=info msg="CreateContainer within sandbox \"ed6cc4060a12c8838c8efd26bb973811a77e13d770eb292c66fe7a7ac3b933d1\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"5033331000fe73bb2abc597459628711155e3424e60734f67cdec450694125a0\"" Dec 13 14:15:39.263629 env[1818]: time="2024-12-13T14:15:39.263551962Z" level=info msg="StartContainer for \"5033331000fe73bb2abc597459628711155e3424e60734f67cdec450694125a0\"" Dec 13 14:15:39.321459 systemd[1]: Started cri-containerd-5033331000fe73bb2abc597459628711155e3424e60734f67cdec450694125a0.scope. Dec 13 14:15:39.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:39.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:39.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:39.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:39.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:39.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:39.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:39.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:39.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:39.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:39.363000 audit: BPF prog-id=192 op=LOAD Dec 13 14:15:39.365000 audit[5104]: AVC avc: denied { bpf } for pid=5104 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:39.365000 audit[5104]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=5049 pid=5104 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:39.365000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530333333333130303066653733626232616263353937343539363238 Dec 13 14:15:39.366000 audit[5104]: AVC avc: denied { perfmon } for pid=5104 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:39.366000 audit[5104]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=5049 pid=5104 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:39.366000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530333333333130303066653733626232616263353937343539363238 Dec 13 14:15:39.366000 audit[5104]: AVC avc: denied { bpf } for pid=5104 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:39.366000 audit[5104]: AVC avc: denied { bpf } for pid=5104 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:39.366000 audit[5104]: AVC avc: denied { bpf } for pid=5104 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:39.366000 audit[5104]: AVC avc: denied { perfmon } for pid=5104 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:39.366000 audit[5104]: AVC avc: denied { perfmon } for pid=5104 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:39.366000 audit[5104]: AVC avc: denied { perfmon } for pid=5104 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:39.366000 audit[5104]: AVC avc: denied { perfmon } for pid=5104 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:39.366000 audit[5104]: AVC avc: denied { perfmon } for pid=5104 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:39.366000 audit[5104]: AVC avc: denied { bpf } for pid=5104 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:39.366000 audit[5104]: AVC avc: denied { bpf } for pid=5104 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:39.366000 audit: BPF prog-id=193 op=LOAD Dec 13 14:15:39.366000 audit[5104]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=5049 pid=5104 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:39.366000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530333333333130303066653733626232616263353937343539363238 Dec 13 14:15:39.368000 audit[5104]: AVC avc: denied { bpf } for pid=5104 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:39.368000 audit[5104]: AVC avc: denied { bpf } for pid=5104 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:39.368000 audit[5104]: AVC avc: denied { perfmon } for pid=5104 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:39.368000 audit[5104]: AVC avc: denied { perfmon } for pid=5104 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:39.368000 audit[5104]: AVC avc: denied { perfmon } for pid=5104 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:39.368000 audit[5104]: AVC avc: denied { perfmon } for pid=5104 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:39.368000 audit[5104]: AVC avc: denied { perfmon } for pid=5104 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:39.368000 audit[5104]: AVC avc: denied { bpf } for pid=5104 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:39.368000 audit[5104]: AVC avc: denied { bpf } for pid=5104 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:39.368000 audit: BPF prog-id=194 op=LOAD Dec 13 14:15:39.368000 audit[5104]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=5049 pid=5104 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:39.368000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530333333333130303066653733626232616263353937343539363238 Dec 13 14:15:39.370000 audit: BPF prog-id=194 op=UNLOAD Dec 13 14:15:39.370000 audit: BPF prog-id=193 op=UNLOAD Dec 13 14:15:39.371000 audit[5104]: AVC avc: denied { bpf } for pid=5104 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:39.371000 audit[5104]: AVC avc: denied { bpf } for pid=5104 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:39.371000 audit[5104]: AVC avc: denied { bpf } for pid=5104 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:39.371000 audit[5104]: AVC avc: denied { perfmon } for pid=5104 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:39.371000 audit[5104]: AVC avc: denied { perfmon } for pid=5104 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:39.371000 audit[5104]: AVC avc: denied { perfmon } for pid=5104 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:39.371000 audit[5104]: AVC avc: denied { perfmon } for pid=5104 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:39.371000 audit[5104]: AVC avc: denied { perfmon } for pid=5104 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:39.371000 audit[5104]: AVC avc: denied { bpf } for pid=5104 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:39.371000 audit[5104]: AVC avc: denied { bpf } for pid=5104 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:39.371000 audit: BPF prog-id=195 op=LOAD Dec 13 14:15:39.371000 audit[5104]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=5049 pid=5104 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:39.371000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530333333333130303066653733626232616263353937343539363238 Dec 13 14:15:39.413668 env[1818]: time="2024-12-13T14:15:39.413460183Z" level=info msg="StartContainer for \"5033331000fe73bb2abc597459628711155e3424e60734f67cdec450694125a0\" returns successfully" Dec 13 14:15:39.663664 systemd-networkd[1540]: cali46876c96326: Gained IPv6LL Dec 13 14:15:39.820000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.31.18.231:22-139.178.89.65:40358 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:39.822057 systemd[1]: Started sshd@8-172.31.18.231:22-139.178.89.65:40358.service. Dec 13 14:15:39.859835 kubelet[3066]: I1213 14:15:39.859786 3066 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-76f75df574-hzf8c" podStartSLOduration=44.859595179 podStartE2EDuration="44.859595179s" podCreationTimestamp="2024-12-13 14:14:55 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:15:39.859192606 +0000 UTC m=+57.701466095" watchObservedRunningTime="2024-12-13 14:15:39.859595179 +0000 UTC m=+57.701868644" Dec 13 14:15:39.904982 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount966391382.mount: Deactivated successfully. Dec 13 14:15:40.030000 audit[5135]: NETFILTER_CFG table=filter:111 family=2 entries=10 op=nft_register_rule pid=5135 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:15:40.030000 audit[5135]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=ffffd7d77e90 a2=0 a3=1 items=0 ppid=3199 pid=5135 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:40.030000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:15:40.037000 audit[5132]: USER_ACCT pid=5132 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:15:40.039031 sshd[5132]: Accepted publickey for core from 139.178.89.65 port 40358 ssh2: RSA SHA256:07jB2DPJgjjhgg3L8Uh349EZ0zHZFrUiRWNbK+Fdo0Q Dec 13 14:15:40.039000 audit[5132]: CRED_ACQ pid=5132 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:15:40.039000 audit[5132]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffcd3d2b90 a2=3 a3=1 items=0 ppid=1 pid=5132 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:40.039000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:15:40.042198 sshd[5132]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:15:40.052445 systemd-logind[1810]: New session 9 of user core. Dec 13 14:15:40.054339 systemd[1]: Started session-9.scope. Dec 13 14:15:40.065000 audit[5132]: USER_START pid=5132 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:15:40.071000 audit[5136]: CRED_ACQ pid=5136 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:15:40.072000 audit[5135]: NETFILTER_CFG table=nat:112 family=2 entries=44 op=nft_register_rule pid=5135 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:15:40.072000 audit[5135]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=14196 a0=3 a1=ffffd7d77e90 a2=0 a3=1 items=0 ppid=3199 pid=5135 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:40.072000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:15:40.090000 audit[5138]: NETFILTER_CFG table=filter:113 family=2 entries=10 op=nft_register_rule pid=5138 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:15:40.090000 audit[5138]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=fffff2d0c2b0 a2=0 a3=1 items=0 ppid=3199 pid=5138 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:40.090000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:15:40.104000 audit[5138]: NETFILTER_CFG table=nat:114 family=2 entries=56 op=nft_register_chain pid=5138 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:15:40.104000 audit[5138]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19860 a0=3 a1=fffff2d0c2b0 a2=0 a3=1 items=0 ppid=3199 pid=5138 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:40.104000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:15:40.238769 systemd-networkd[1540]: calic913a7d0c6c: Gained IPv6LL Dec 13 14:15:40.449881 sshd[5132]: pam_unix(sshd:session): session closed for user core Dec 13 14:15:40.451000 audit[5132]: USER_END pid=5132 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:15:40.451000 audit[5132]: CRED_DISP pid=5132 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:15:40.457976 systemd[1]: sshd@8-172.31.18.231:22-139.178.89.65:40358.service: Deactivated successfully. Dec 13 14:15:40.457000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.31.18.231:22-139.178.89.65:40358 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:40.459526 systemd-logind[1810]: Session 9 logged out. Waiting for processes to exit. Dec 13 14:15:40.460943 systemd[1]: session-9.scope: Deactivated successfully. Dec 13 14:15:40.464930 systemd-logind[1810]: Removed session 9. Dec 13 14:15:40.477494 env[1818]: time="2024-12-13T14:15:40.477431621Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:15:40.482393 env[1818]: time="2024-12-13T14:15:40.482335100Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5451b31bd8d0784796fa1204c4ec22975a270e21feadf2c5095fe41a38524c6c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:15:40.487112 env[1818]: time="2024-12-13T14:15:40.487051122Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:15:40.491173 env[1818]: time="2024-12-13T14:15:40.491094493Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:b8c43e264fe52e0c327b0bf3ac882a0224b33bdd7f4ff58a74242da7d9b00486,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:15:40.492158 env[1818]: time="2024-12-13T14:15:40.492086975Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\" returns image reference \"sha256:5451b31bd8d0784796fa1204c4ec22975a270e21feadf2c5095fe41a38524c6c\"" Dec 13 14:15:40.493638 env[1818]: time="2024-12-13T14:15:40.493576677Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\"" Dec 13 14:15:40.502305 env[1818]: time="2024-12-13T14:15:40.502239780Z" level=info msg="CreateContainer within sandbox \"02c28e9b95d31b983b95197150c917cfd0dbc61162162d79cbfb0f940d4a3759\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Dec 13 14:15:40.537194 env[1818]: time="2024-12-13T14:15:40.537101740Z" level=info msg="CreateContainer within sandbox \"02c28e9b95d31b983b95197150c917cfd0dbc61162162d79cbfb0f940d4a3759\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"35da67f51ec018148686338ff5833db4e2589daa6895e4590db018b68560a897\"" Dec 13 14:15:40.538518 env[1818]: time="2024-12-13T14:15:40.538404682Z" level=info msg="StartContainer for \"35da67f51ec018148686338ff5833db4e2589daa6895e4590db018b68560a897\"" Dec 13 14:15:40.623596 systemd[1]: run-containerd-runc-k8s.io-35da67f51ec018148686338ff5833db4e2589daa6895e4590db018b68560a897-runc.zW1Cea.mount: Deactivated successfully. Dec 13 14:15:40.640474 systemd[1]: Started cri-containerd-35da67f51ec018148686338ff5833db4e2589daa6895e4590db018b68560a897.scope. Dec 13 14:15:40.688000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:40.688000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:40.688000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:40.688000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:40.688000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:40.688000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:40.688000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:40.688000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:40.688000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:40.689000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:40.689000 audit: BPF prog-id=196 op=LOAD Dec 13 14:15:40.690000 audit[5158]: AVC avc: denied { bpf } for pid=5158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:40.690000 audit[5158]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4411 pid=5158 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:40.690000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335646136376635316563303138313438363836333338666635383333 Dec 13 14:15:40.690000 audit[5158]: AVC avc: denied { perfmon } for pid=5158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:40.690000 audit[5158]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4411 pid=5158 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:40.690000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335646136376635316563303138313438363836333338666635383333 Dec 13 14:15:40.690000 audit[5158]: AVC avc: denied { bpf } for pid=5158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:40.690000 audit[5158]: AVC avc: denied { bpf } for pid=5158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:40.690000 audit[5158]: AVC avc: denied { bpf } for pid=5158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:40.690000 audit[5158]: AVC avc: denied { perfmon } for pid=5158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:40.690000 audit[5158]: AVC avc: denied { perfmon } for pid=5158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:40.690000 audit[5158]: AVC avc: denied { perfmon } for pid=5158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:40.690000 audit[5158]: AVC avc: denied { perfmon } for pid=5158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:40.690000 audit[5158]: AVC avc: denied { perfmon } for pid=5158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:40.690000 audit[5158]: AVC avc: denied { bpf } for pid=5158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:40.690000 audit[5158]: AVC avc: denied { bpf } for pid=5158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:40.690000 audit: BPF prog-id=197 op=LOAD Dec 13 14:15:40.690000 audit[5158]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4411 pid=5158 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:40.690000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335646136376635316563303138313438363836333338666635383333 Dec 13 14:15:40.690000 audit[5158]: AVC avc: denied { bpf } for pid=5158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:40.690000 audit[5158]: AVC avc: denied { bpf } for pid=5158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:40.690000 audit[5158]: AVC avc: denied { perfmon } for pid=5158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:40.690000 audit[5158]: AVC avc: denied { perfmon } for pid=5158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:40.690000 audit[5158]: AVC avc: denied { perfmon } for pid=5158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:40.690000 audit[5158]: AVC avc: denied { perfmon } for pid=5158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:40.690000 audit[5158]: AVC avc: denied { perfmon } for pid=5158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:40.690000 audit[5158]: AVC avc: denied { bpf } for pid=5158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:40.690000 audit[5158]: AVC avc: denied { bpf } for pid=5158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:40.690000 audit: BPF prog-id=198 op=LOAD Dec 13 14:15:40.690000 audit[5158]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4411 pid=5158 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:40.690000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335646136376635316563303138313438363836333338666635383333 Dec 13 14:15:40.690000 audit: BPF prog-id=198 op=UNLOAD Dec 13 14:15:40.690000 audit: BPF prog-id=197 op=UNLOAD Dec 13 14:15:40.690000 audit[5158]: AVC avc: denied { bpf } for pid=5158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:40.690000 audit[5158]: AVC avc: denied { bpf } for pid=5158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:40.690000 audit[5158]: AVC avc: denied { bpf } for pid=5158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:40.690000 audit[5158]: AVC avc: denied { perfmon } for pid=5158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:40.690000 audit[5158]: AVC avc: denied { perfmon } for pid=5158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:40.690000 audit[5158]: AVC avc: denied { perfmon } for pid=5158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:40.690000 audit[5158]: AVC avc: denied { perfmon } for pid=5158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:40.690000 audit[5158]: AVC avc: denied { perfmon } for pid=5158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:40.690000 audit[5158]: AVC avc: denied { bpf } for pid=5158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:40.690000 audit[5158]: AVC avc: denied { bpf } for pid=5158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:40.690000 audit: BPF prog-id=199 op=LOAD Dec 13 14:15:40.690000 audit[5158]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4411 pid=5158 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:40.690000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335646136376635316563303138313438363836333338666635383333 Dec 13 14:15:40.758882 env[1818]: time="2024-12-13T14:15:40.758795307Z" level=info msg="StartContainer for \"35da67f51ec018148686338ff5833db4e2589daa6895e4590db018b68560a897\" returns successfully" Dec 13 14:15:41.137000 audit[5188]: NETFILTER_CFG table=filter:115 family=2 entries=10 op=nft_register_rule pid=5188 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:15:41.137000 audit[5188]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=ffffd4534d70 a2=0 a3=1 items=0 ppid=3199 pid=5188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:41.137000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:15:41.143000 audit[5188]: NETFILTER_CFG table=nat:116 family=2 entries=20 op=nft_register_rule pid=5188 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:15:41.143000 audit[5188]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=ffffd4534d70 a2=0 a3=1 items=0 ppid=3199 pid=5188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:41.143000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:15:41.830789 kubelet[3066]: I1213 14:15:41.830737 3066 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 14:15:42.240896 env[1818]: time="2024-12-13T14:15:42.240775342Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:15:42.244617 env[1818]: time="2024-12-13T14:15:42.244501399Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3c11734f3001b7070e7e2b5e64938f89891cf8c44f8997e86aa23c5d5bf70163,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:15:42.246878 env[1818]: time="2024-12-13T14:15:42.246809613Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:15:42.249648 env[1818]: time="2024-12-13T14:15:42.249565460Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:eaa7e01fb16b603c155a67b81f16992281db7f831684c7b2081d3434587a7ff3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:15:42.251166 env[1818]: time="2024-12-13T14:15:42.251101086Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\" returns image reference \"sha256:3c11734f3001b7070e7e2b5e64938f89891cf8c44f8997e86aa23c5d5bf70163\"" Dec 13 14:15:42.253153 env[1818]: time="2024-12-13T14:15:42.253098697Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.1\"" Dec 13 14:15:42.258207 env[1818]: time="2024-12-13T14:15:42.258117254Z" level=info msg="CreateContainer within sandbox \"61f5ef52a7faf544c16cba1d3e653763ad2a02a602e536a9835ac431621518ae\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Dec 13 14:15:42.292590 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1619781795.mount: Deactivated successfully. Dec 13 14:15:42.295894 env[1818]: time="2024-12-13T14:15:42.295800746Z" level=info msg="CreateContainer within sandbox \"61f5ef52a7faf544c16cba1d3e653763ad2a02a602e536a9835ac431621518ae\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"17e42f5deb3840575347f2d4d9a8c488ca4168d13901cf3990be8ad1d150f25f\"" Dec 13 14:15:42.297616 env[1818]: time="2024-12-13T14:15:42.297563176Z" level=info msg="StartContainer for \"17e42f5deb3840575347f2d4d9a8c488ca4168d13901cf3990be8ad1d150f25f\"" Dec 13 14:15:42.374897 systemd[1]: Started cri-containerd-17e42f5deb3840575347f2d4d9a8c488ca4168d13901cf3990be8ad1d150f25f.scope. Dec 13 14:15:42.406268 systemd[1]: run-containerd-runc-k8s.io-17e42f5deb3840575347f2d4d9a8c488ca4168d13901cf3990be8ad1d150f25f-runc.pLxc3k.mount: Deactivated successfully. Dec 13 14:15:42.425681 env[1818]: time="2024-12-13T14:15:42.425625007Z" level=info msg="StopPodSandbox for \"429c2476fb25426d228c324ac7a91243ab78ad777b796c38b9f5ab890adce0da\"" Dec 13 14:15:42.561000 audit[5202]: AVC avc: denied { perfmon } for pid=5202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:42.565338 kernel: kauditd_printk_skb: 403 callbacks suppressed Dec 13 14:15:42.565508 kernel: audit: type=1400 audit(1734099342.561:1323): avc: denied { perfmon } for pid=5202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:42.561000 audit[5202]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=4836 pid=5202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:42.584305 kernel: audit: type=1300 audit(1734099342.561:1323): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=4836 pid=5202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:42.561000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137653432663564656233383430353735333437663264346439613863 Dec 13 14:15:42.598445 kernel: audit: type=1327 audit(1734099342.561:1323): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137653432663564656233383430353735333437663264346439613863 Dec 13 14:15:42.605802 kernel: audit: type=1400 audit(1734099342.562:1324): avc: denied { bpf } for pid=5202 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:42.562000 audit[5202]: AVC avc: denied { bpf } for pid=5202 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:42.562000 audit[5202]: AVC avc: denied { bpf } for pid=5202 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:42.617875 kernel: audit: type=1400 audit(1734099342.562:1324): avc: denied { bpf } for pid=5202 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:42.562000 audit[5202]: AVC avc: denied { bpf } for pid=5202 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:42.629865 kernel: audit: type=1400 audit(1734099342.562:1324): avc: denied { bpf } for pid=5202 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:42.644701 kernel: audit: type=1400 audit(1734099342.562:1324): avc: denied { perfmon } for pid=5202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:42.562000 audit[5202]: AVC avc: denied { perfmon } for pid=5202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:42.654683 kernel: audit: type=1400 audit(1734099342.562:1324): avc: denied { perfmon } for pid=5202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:42.562000 audit[5202]: AVC avc: denied { perfmon } for pid=5202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:42.562000 audit[5202]: AVC avc: denied { perfmon } for pid=5202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:42.668009 kernel: audit: type=1400 audit(1734099342.562:1324): avc: denied { perfmon } for pid=5202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:42.680610 kernel: audit: type=1400 audit(1734099342.562:1324): avc: denied { perfmon } for pid=5202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:42.562000 audit[5202]: AVC avc: denied { perfmon } for pid=5202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:42.562000 audit[5202]: AVC avc: denied { perfmon } for pid=5202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:42.562000 audit[5202]: AVC avc: denied { bpf } for pid=5202 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:42.562000 audit[5202]: AVC avc: denied { bpf } for pid=5202 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:42.562000 audit: BPF prog-id=200 op=LOAD Dec 13 14:15:42.562000 audit[5202]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=4836 pid=5202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:42.562000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137653432663564656233383430353735333437663264346439613863 Dec 13 14:15:42.564000 audit[5202]: AVC avc: denied { bpf } for pid=5202 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:42.564000 audit[5202]: AVC avc: denied { bpf } for pid=5202 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:42.564000 audit[5202]: AVC avc: denied { perfmon } for pid=5202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:42.564000 audit[5202]: AVC avc: denied { perfmon } for pid=5202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:42.564000 audit[5202]: AVC avc: denied { perfmon } for pid=5202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:42.564000 audit[5202]: AVC avc: denied { perfmon } for pid=5202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:42.564000 audit[5202]: AVC avc: denied { perfmon } for pid=5202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:42.564000 audit[5202]: AVC avc: denied { bpf } for pid=5202 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:42.564000 audit[5202]: AVC avc: denied { bpf } for pid=5202 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:42.564000 audit: BPF prog-id=201 op=LOAD Dec 13 14:15:42.564000 audit[5202]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=4836 pid=5202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:42.564000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137653432663564656233383430353735333437663264346439613863 Dec 13 14:15:42.577000 audit: BPF prog-id=201 op=UNLOAD Dec 13 14:15:42.577000 audit: BPF prog-id=200 op=UNLOAD Dec 13 14:15:42.577000 audit[5202]: AVC avc: denied { bpf } for pid=5202 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:42.577000 audit[5202]: AVC avc: denied { bpf } for pid=5202 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:42.577000 audit[5202]: AVC avc: denied { bpf } for pid=5202 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:42.577000 audit[5202]: AVC avc: denied { perfmon } for pid=5202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:42.577000 audit[5202]: AVC avc: denied { perfmon } for pid=5202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:42.577000 audit[5202]: AVC avc: denied { perfmon } for pid=5202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:42.577000 audit[5202]: AVC avc: denied { perfmon } for pid=5202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:42.577000 audit[5202]: AVC avc: denied { perfmon } for pid=5202 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:42.577000 audit[5202]: AVC avc: denied { bpf } for pid=5202 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:42.577000 audit[5202]: AVC avc: denied { bpf } for pid=5202 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:42.577000 audit: BPF prog-id=202 op=LOAD Dec 13 14:15:42.577000 audit[5202]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=4836 pid=5202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:42.577000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137653432663564656233383430353735333437663264346439613863 Dec 13 14:15:42.728505 env[1818]: 2024-12-13 14:15:42.536 [WARNING][5228] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="429c2476fb25426d228c324ac7a91243ab78ad777b796c38b9f5ab890adce0da" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--18--231-k8s-calico--apiserver--8878db5b5--qh9tk-eth0", GenerateName:"calico-apiserver-8878db5b5-", Namespace:"calico-apiserver", SelfLink:"", UID:"aa265595-980c-417f-a569-c324ec426ee4", ResourceVersion:"921", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 15, 5, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"8878db5b5", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-18-231", ContainerID:"02c28e9b95d31b983b95197150c917cfd0dbc61162162d79cbfb0f940d4a3759", Pod:"calico-apiserver-8878db5b5-qh9tk", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.34.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calic154195ee2a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:15:42.728505 env[1818]: 2024-12-13 14:15:42.536 [INFO][5228] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="429c2476fb25426d228c324ac7a91243ab78ad777b796c38b9f5ab890adce0da" Dec 13 14:15:42.728505 env[1818]: 2024-12-13 14:15:42.536 [INFO][5228] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="429c2476fb25426d228c324ac7a91243ab78ad777b796c38b9f5ab890adce0da" iface="eth0" netns="" Dec 13 14:15:42.728505 env[1818]: 2024-12-13 14:15:42.536 [INFO][5228] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="429c2476fb25426d228c324ac7a91243ab78ad777b796c38b9f5ab890adce0da" Dec 13 14:15:42.728505 env[1818]: 2024-12-13 14:15:42.536 [INFO][5228] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="429c2476fb25426d228c324ac7a91243ab78ad777b796c38b9f5ab890adce0da" Dec 13 14:15:42.728505 env[1818]: 2024-12-13 14:15:42.653 [INFO][5242] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="429c2476fb25426d228c324ac7a91243ab78ad777b796c38b9f5ab890adce0da" HandleID="k8s-pod-network.429c2476fb25426d228c324ac7a91243ab78ad777b796c38b9f5ab890adce0da" Workload="ip--172--31--18--231-k8s-calico--apiserver--8878db5b5--qh9tk-eth0" Dec 13 14:15:42.728505 env[1818]: 2024-12-13 14:15:42.683 [INFO][5242] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:15:42.728505 env[1818]: 2024-12-13 14:15:42.684 [INFO][5242] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:15:42.728505 env[1818]: 2024-12-13 14:15:42.714 [WARNING][5242] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="429c2476fb25426d228c324ac7a91243ab78ad777b796c38b9f5ab890adce0da" HandleID="k8s-pod-network.429c2476fb25426d228c324ac7a91243ab78ad777b796c38b9f5ab890adce0da" Workload="ip--172--31--18--231-k8s-calico--apiserver--8878db5b5--qh9tk-eth0" Dec 13 14:15:42.728505 env[1818]: 2024-12-13 14:15:42.714 [INFO][5242] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="429c2476fb25426d228c324ac7a91243ab78ad777b796c38b9f5ab890adce0da" HandleID="k8s-pod-network.429c2476fb25426d228c324ac7a91243ab78ad777b796c38b9f5ab890adce0da" Workload="ip--172--31--18--231-k8s-calico--apiserver--8878db5b5--qh9tk-eth0" Dec 13 14:15:42.728505 env[1818]: 2024-12-13 14:15:42.717 [INFO][5242] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:15:42.728505 env[1818]: 2024-12-13 14:15:42.723 [INFO][5228] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="429c2476fb25426d228c324ac7a91243ab78ad777b796c38b9f5ab890adce0da" Dec 13 14:15:42.728505 env[1818]: time="2024-12-13T14:15:42.726513693Z" level=info msg="TearDown network for sandbox \"429c2476fb25426d228c324ac7a91243ab78ad777b796c38b9f5ab890adce0da\" successfully" Dec 13 14:15:42.728505 env[1818]: time="2024-12-13T14:15:42.726560530Z" level=info msg="StopPodSandbox for \"429c2476fb25426d228c324ac7a91243ab78ad777b796c38b9f5ab890adce0da\" returns successfully" Dec 13 14:15:42.728505 env[1818]: time="2024-12-13T14:15:42.727365100Z" level=info msg="RemovePodSandbox for \"429c2476fb25426d228c324ac7a91243ab78ad777b796c38b9f5ab890adce0da\"" Dec 13 14:15:42.728505 env[1818]: time="2024-12-13T14:15:42.727436369Z" level=info msg="Forcibly stopping sandbox \"429c2476fb25426d228c324ac7a91243ab78ad777b796c38b9f5ab890adce0da\"" Dec 13 14:15:42.747065 env[1818]: time="2024-12-13T14:15:42.746980665Z" level=info msg="StartContainer for \"17e42f5deb3840575347f2d4d9a8c488ca4168d13901cf3990be8ad1d150f25f\" returns successfully" Dec 13 14:15:42.914368 env[1818]: 2024-12-13 14:15:42.823 [WARNING][5269] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="429c2476fb25426d228c324ac7a91243ab78ad777b796c38b9f5ab890adce0da" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--18--231-k8s-calico--apiserver--8878db5b5--qh9tk-eth0", GenerateName:"calico-apiserver-8878db5b5-", Namespace:"calico-apiserver", SelfLink:"", UID:"aa265595-980c-417f-a569-c324ec426ee4", ResourceVersion:"921", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 15, 5, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"8878db5b5", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-18-231", ContainerID:"02c28e9b95d31b983b95197150c917cfd0dbc61162162d79cbfb0f940d4a3759", Pod:"calico-apiserver-8878db5b5-qh9tk", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.34.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calic154195ee2a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:15:42.914368 env[1818]: 2024-12-13 14:15:42.824 [INFO][5269] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="429c2476fb25426d228c324ac7a91243ab78ad777b796c38b9f5ab890adce0da" Dec 13 14:15:42.914368 env[1818]: 2024-12-13 14:15:42.824 [INFO][5269] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="429c2476fb25426d228c324ac7a91243ab78ad777b796c38b9f5ab890adce0da" iface="eth0" netns="" Dec 13 14:15:42.914368 env[1818]: 2024-12-13 14:15:42.824 [INFO][5269] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="429c2476fb25426d228c324ac7a91243ab78ad777b796c38b9f5ab890adce0da" Dec 13 14:15:42.914368 env[1818]: 2024-12-13 14:15:42.824 [INFO][5269] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="429c2476fb25426d228c324ac7a91243ab78ad777b796c38b9f5ab890adce0da" Dec 13 14:15:42.914368 env[1818]: 2024-12-13 14:15:42.886 [INFO][5280] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="429c2476fb25426d228c324ac7a91243ab78ad777b796c38b9f5ab890adce0da" HandleID="k8s-pod-network.429c2476fb25426d228c324ac7a91243ab78ad777b796c38b9f5ab890adce0da" Workload="ip--172--31--18--231-k8s-calico--apiserver--8878db5b5--qh9tk-eth0" Dec 13 14:15:42.914368 env[1818]: 2024-12-13 14:15:42.886 [INFO][5280] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:15:42.914368 env[1818]: 2024-12-13 14:15:42.887 [INFO][5280] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:15:42.914368 env[1818]: 2024-12-13 14:15:42.901 [WARNING][5280] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="429c2476fb25426d228c324ac7a91243ab78ad777b796c38b9f5ab890adce0da" HandleID="k8s-pod-network.429c2476fb25426d228c324ac7a91243ab78ad777b796c38b9f5ab890adce0da" Workload="ip--172--31--18--231-k8s-calico--apiserver--8878db5b5--qh9tk-eth0" Dec 13 14:15:42.914368 env[1818]: 2024-12-13 14:15:42.901 [INFO][5280] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="429c2476fb25426d228c324ac7a91243ab78ad777b796c38b9f5ab890adce0da" HandleID="k8s-pod-network.429c2476fb25426d228c324ac7a91243ab78ad777b796c38b9f5ab890adce0da" Workload="ip--172--31--18--231-k8s-calico--apiserver--8878db5b5--qh9tk-eth0" Dec 13 14:15:42.914368 env[1818]: 2024-12-13 14:15:42.908 [INFO][5280] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:15:42.914368 env[1818]: 2024-12-13 14:15:42.911 [INFO][5269] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="429c2476fb25426d228c324ac7a91243ab78ad777b796c38b9f5ab890adce0da" Dec 13 14:15:42.915306 env[1818]: time="2024-12-13T14:15:42.914412252Z" level=info msg="TearDown network for sandbox \"429c2476fb25426d228c324ac7a91243ab78ad777b796c38b9f5ab890adce0da\" successfully" Dec 13 14:15:42.920757 env[1818]: time="2024-12-13T14:15:42.920650407Z" level=info msg="RemovePodSandbox \"429c2476fb25426d228c324ac7a91243ab78ad777b796c38b9f5ab890adce0da\" returns successfully" Dec 13 14:15:42.921677 env[1818]: time="2024-12-13T14:15:42.921600576Z" level=info msg="StopPodSandbox for \"4efd2f0a680ad6d670ab93646b15d79ac1cbbc75b8e87abe3d3d6dcab3115dfa\"" Dec 13 14:15:43.116000 audit[5168]: AVC avc: denied { watch } for pid=5168 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_14_15_21.439382433/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c681,c915 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c681,c915 tclass=file permissive=0 Dec 13 14:15:43.116000 audit[5168]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=400028ec60 a2=fc6 a3=0 items=0 ppid=4411 pid=5168 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c681,c915 key=(null) Dec 13 14:15:43.116000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 14:15:43.164007 env[1818]: 2024-12-13 14:15:43.085 [WARNING][5299] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="4efd2f0a680ad6d670ab93646b15d79ac1cbbc75b8e87abe3d3d6dcab3115dfa" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--18--231-k8s-coredns--76f75df574--hzf8c-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"07b86ac8-84b4-4807-aaee-92f8a5bbaa89", ResourceVersion:"909", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 14, 55, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-18-231", ContainerID:"ed6cc4060a12c8838c8efd26bb973811a77e13d770eb292c66fe7a7ac3b933d1", Pod:"coredns-76f75df574-hzf8c", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.34.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calic913a7d0c6c", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:15:43.164007 env[1818]: 2024-12-13 14:15:43.085 [INFO][5299] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="4efd2f0a680ad6d670ab93646b15d79ac1cbbc75b8e87abe3d3d6dcab3115dfa" Dec 13 14:15:43.164007 env[1818]: 2024-12-13 14:15:43.085 [INFO][5299] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="4efd2f0a680ad6d670ab93646b15d79ac1cbbc75b8e87abe3d3d6dcab3115dfa" iface="eth0" netns="" Dec 13 14:15:43.164007 env[1818]: 2024-12-13 14:15:43.085 [INFO][5299] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="4efd2f0a680ad6d670ab93646b15d79ac1cbbc75b8e87abe3d3d6dcab3115dfa" Dec 13 14:15:43.164007 env[1818]: 2024-12-13 14:15:43.085 [INFO][5299] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="4efd2f0a680ad6d670ab93646b15d79ac1cbbc75b8e87abe3d3d6dcab3115dfa" Dec 13 14:15:43.164007 env[1818]: 2024-12-13 14:15:43.141 [INFO][5305] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="4efd2f0a680ad6d670ab93646b15d79ac1cbbc75b8e87abe3d3d6dcab3115dfa" HandleID="k8s-pod-network.4efd2f0a680ad6d670ab93646b15d79ac1cbbc75b8e87abe3d3d6dcab3115dfa" Workload="ip--172--31--18--231-k8s-coredns--76f75df574--hzf8c-eth0" Dec 13 14:15:43.164007 env[1818]: 2024-12-13 14:15:43.142 [INFO][5305] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:15:43.164007 env[1818]: 2024-12-13 14:15:43.142 [INFO][5305] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:15:43.164007 env[1818]: 2024-12-13 14:15:43.155 [WARNING][5305] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="4efd2f0a680ad6d670ab93646b15d79ac1cbbc75b8e87abe3d3d6dcab3115dfa" HandleID="k8s-pod-network.4efd2f0a680ad6d670ab93646b15d79ac1cbbc75b8e87abe3d3d6dcab3115dfa" Workload="ip--172--31--18--231-k8s-coredns--76f75df574--hzf8c-eth0" Dec 13 14:15:43.164007 env[1818]: 2024-12-13 14:15:43.155 [INFO][5305] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="4efd2f0a680ad6d670ab93646b15d79ac1cbbc75b8e87abe3d3d6dcab3115dfa" HandleID="k8s-pod-network.4efd2f0a680ad6d670ab93646b15d79ac1cbbc75b8e87abe3d3d6dcab3115dfa" Workload="ip--172--31--18--231-k8s-coredns--76f75df574--hzf8c-eth0" Dec 13 14:15:43.164007 env[1818]: 2024-12-13 14:15:43.158 [INFO][5305] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:15:43.164007 env[1818]: 2024-12-13 14:15:43.161 [INFO][5299] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="4efd2f0a680ad6d670ab93646b15d79ac1cbbc75b8e87abe3d3d6dcab3115dfa" Dec 13 14:15:43.167297 env[1818]: time="2024-12-13T14:15:43.164060003Z" level=info msg="TearDown network for sandbox \"4efd2f0a680ad6d670ab93646b15d79ac1cbbc75b8e87abe3d3d6dcab3115dfa\" successfully" Dec 13 14:15:43.167297 env[1818]: time="2024-12-13T14:15:43.164107104Z" level=info msg="StopPodSandbox for \"4efd2f0a680ad6d670ab93646b15d79ac1cbbc75b8e87abe3d3d6dcab3115dfa\" returns successfully" Dec 13 14:15:43.167297 env[1818]: time="2024-12-13T14:15:43.165304009Z" level=info msg="RemovePodSandbox for \"4efd2f0a680ad6d670ab93646b15d79ac1cbbc75b8e87abe3d3d6dcab3115dfa\"" Dec 13 14:15:43.167297 env[1818]: time="2024-12-13T14:15:43.165393663Z" level=info msg="Forcibly stopping sandbox \"4efd2f0a680ad6d670ab93646b15d79ac1cbbc75b8e87abe3d3d6dcab3115dfa\"" Dec 13 14:15:43.313224 env[1818]: 2024-12-13 14:15:43.236 [WARNING][5324] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="4efd2f0a680ad6d670ab93646b15d79ac1cbbc75b8e87abe3d3d6dcab3115dfa" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--18--231-k8s-coredns--76f75df574--hzf8c-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"07b86ac8-84b4-4807-aaee-92f8a5bbaa89", ResourceVersion:"909", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 14, 55, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-18-231", ContainerID:"ed6cc4060a12c8838c8efd26bb973811a77e13d770eb292c66fe7a7ac3b933d1", Pod:"coredns-76f75df574-hzf8c", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.34.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calic913a7d0c6c", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:15:43.313224 env[1818]: 2024-12-13 14:15:43.236 [INFO][5324] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="4efd2f0a680ad6d670ab93646b15d79ac1cbbc75b8e87abe3d3d6dcab3115dfa" Dec 13 14:15:43.313224 env[1818]: 2024-12-13 14:15:43.236 [INFO][5324] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="4efd2f0a680ad6d670ab93646b15d79ac1cbbc75b8e87abe3d3d6dcab3115dfa" iface="eth0" netns="" Dec 13 14:15:43.313224 env[1818]: 2024-12-13 14:15:43.236 [INFO][5324] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="4efd2f0a680ad6d670ab93646b15d79ac1cbbc75b8e87abe3d3d6dcab3115dfa" Dec 13 14:15:43.313224 env[1818]: 2024-12-13 14:15:43.236 [INFO][5324] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="4efd2f0a680ad6d670ab93646b15d79ac1cbbc75b8e87abe3d3d6dcab3115dfa" Dec 13 14:15:43.313224 env[1818]: 2024-12-13 14:15:43.291 [INFO][5332] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="4efd2f0a680ad6d670ab93646b15d79ac1cbbc75b8e87abe3d3d6dcab3115dfa" HandleID="k8s-pod-network.4efd2f0a680ad6d670ab93646b15d79ac1cbbc75b8e87abe3d3d6dcab3115dfa" Workload="ip--172--31--18--231-k8s-coredns--76f75df574--hzf8c-eth0" Dec 13 14:15:43.313224 env[1818]: 2024-12-13 14:15:43.291 [INFO][5332] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:15:43.313224 env[1818]: 2024-12-13 14:15:43.291 [INFO][5332] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:15:43.313224 env[1818]: 2024-12-13 14:15:43.304 [WARNING][5332] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="4efd2f0a680ad6d670ab93646b15d79ac1cbbc75b8e87abe3d3d6dcab3115dfa" HandleID="k8s-pod-network.4efd2f0a680ad6d670ab93646b15d79ac1cbbc75b8e87abe3d3d6dcab3115dfa" Workload="ip--172--31--18--231-k8s-coredns--76f75df574--hzf8c-eth0" Dec 13 14:15:43.313224 env[1818]: 2024-12-13 14:15:43.304 [INFO][5332] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="4efd2f0a680ad6d670ab93646b15d79ac1cbbc75b8e87abe3d3d6dcab3115dfa" HandleID="k8s-pod-network.4efd2f0a680ad6d670ab93646b15d79ac1cbbc75b8e87abe3d3d6dcab3115dfa" Workload="ip--172--31--18--231-k8s-coredns--76f75df574--hzf8c-eth0" Dec 13 14:15:43.313224 env[1818]: 2024-12-13 14:15:43.307 [INFO][5332] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:15:43.313224 env[1818]: 2024-12-13 14:15:43.310 [INFO][5324] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="4efd2f0a680ad6d670ab93646b15d79ac1cbbc75b8e87abe3d3d6dcab3115dfa" Dec 13 14:15:43.314661 env[1818]: time="2024-12-13T14:15:43.313272831Z" level=info msg="TearDown network for sandbox \"4efd2f0a680ad6d670ab93646b15d79ac1cbbc75b8e87abe3d3d6dcab3115dfa\" successfully" Dec 13 14:15:43.320328 env[1818]: time="2024-12-13T14:15:43.320144730Z" level=info msg="RemovePodSandbox \"4efd2f0a680ad6d670ab93646b15d79ac1cbbc75b8e87abe3d3d6dcab3115dfa\" returns successfully" Dec 13 14:15:43.321215 env[1818]: time="2024-12-13T14:15:43.321160203Z" level=info msg="StopPodSandbox for \"9b54c2d2c7a66991a186af63a0fea2aaa4b9612969afd62fc0ef6c84e1feeea1\"" Dec 13 14:15:43.483606 env[1818]: 2024-12-13 14:15:43.393 [WARNING][5353] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="9b54c2d2c7a66991a186af63a0fea2aaa4b9612969afd62fc0ef6c84e1feeea1" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--18--231-k8s-coredns--76f75df574--5kblv-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"ba6ec834-0540-4939-8d56-4186c0a4284f", ResourceVersion:"861", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 14, 55, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-18-231", ContainerID:"ae29b51d2f87ad87acb7b012aa06bb63cec4ef491d7581504a85cbc41b16c62b", Pod:"coredns-76f75df574-5kblv", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.34.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali0e8cf072f73", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:15:43.483606 env[1818]: 2024-12-13 14:15:43.395 [INFO][5353] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="9b54c2d2c7a66991a186af63a0fea2aaa4b9612969afd62fc0ef6c84e1feeea1" Dec 13 14:15:43.483606 env[1818]: 2024-12-13 14:15:43.395 [INFO][5353] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="9b54c2d2c7a66991a186af63a0fea2aaa4b9612969afd62fc0ef6c84e1feeea1" iface="eth0" netns="" Dec 13 14:15:43.483606 env[1818]: 2024-12-13 14:15:43.395 [INFO][5353] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="9b54c2d2c7a66991a186af63a0fea2aaa4b9612969afd62fc0ef6c84e1feeea1" Dec 13 14:15:43.483606 env[1818]: 2024-12-13 14:15:43.395 [INFO][5353] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="9b54c2d2c7a66991a186af63a0fea2aaa4b9612969afd62fc0ef6c84e1feeea1" Dec 13 14:15:43.483606 env[1818]: 2024-12-13 14:15:43.451 [INFO][5360] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="9b54c2d2c7a66991a186af63a0fea2aaa4b9612969afd62fc0ef6c84e1feeea1" HandleID="k8s-pod-network.9b54c2d2c7a66991a186af63a0fea2aaa4b9612969afd62fc0ef6c84e1feeea1" Workload="ip--172--31--18--231-k8s-coredns--76f75df574--5kblv-eth0" Dec 13 14:15:43.483606 env[1818]: 2024-12-13 14:15:43.452 [INFO][5360] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:15:43.483606 env[1818]: 2024-12-13 14:15:43.452 [INFO][5360] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:15:43.483606 env[1818]: 2024-12-13 14:15:43.468 [WARNING][5360] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="9b54c2d2c7a66991a186af63a0fea2aaa4b9612969afd62fc0ef6c84e1feeea1" HandleID="k8s-pod-network.9b54c2d2c7a66991a186af63a0fea2aaa4b9612969afd62fc0ef6c84e1feeea1" Workload="ip--172--31--18--231-k8s-coredns--76f75df574--5kblv-eth0" Dec 13 14:15:43.483606 env[1818]: 2024-12-13 14:15:43.468 [INFO][5360] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="9b54c2d2c7a66991a186af63a0fea2aaa4b9612969afd62fc0ef6c84e1feeea1" HandleID="k8s-pod-network.9b54c2d2c7a66991a186af63a0fea2aaa4b9612969afd62fc0ef6c84e1feeea1" Workload="ip--172--31--18--231-k8s-coredns--76f75df574--5kblv-eth0" Dec 13 14:15:43.483606 env[1818]: 2024-12-13 14:15:43.472 [INFO][5360] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:15:43.483606 env[1818]: 2024-12-13 14:15:43.477 [INFO][5353] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="9b54c2d2c7a66991a186af63a0fea2aaa4b9612969afd62fc0ef6c84e1feeea1" Dec 13 14:15:43.483606 env[1818]: time="2024-12-13T14:15:43.482141658Z" level=info msg="TearDown network for sandbox \"9b54c2d2c7a66991a186af63a0fea2aaa4b9612969afd62fc0ef6c84e1feeea1\" successfully" Dec 13 14:15:43.483606 env[1818]: time="2024-12-13T14:15:43.482186563Z" level=info msg="StopPodSandbox for \"9b54c2d2c7a66991a186af63a0fea2aaa4b9612969afd62fc0ef6c84e1feeea1\" returns successfully" Dec 13 14:15:43.484766 env[1818]: time="2024-12-13T14:15:43.483722775Z" level=info msg="RemovePodSandbox for \"9b54c2d2c7a66991a186af63a0fea2aaa4b9612969afd62fc0ef6c84e1feeea1\"" Dec 13 14:15:43.484766 env[1818]: time="2024-12-13T14:15:43.483779837Z" level=info msg="Forcibly stopping sandbox \"9b54c2d2c7a66991a186af63a0fea2aaa4b9612969afd62fc0ef6c84e1feeea1\"" Dec 13 14:15:43.651338 env[1818]: 2024-12-13 14:15:43.562 [WARNING][5379] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="9b54c2d2c7a66991a186af63a0fea2aaa4b9612969afd62fc0ef6c84e1feeea1" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--18--231-k8s-coredns--76f75df574--5kblv-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"ba6ec834-0540-4939-8d56-4186c0a4284f", ResourceVersion:"861", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 14, 55, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-18-231", ContainerID:"ae29b51d2f87ad87acb7b012aa06bb63cec4ef491d7581504a85cbc41b16c62b", Pod:"coredns-76f75df574-5kblv", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.34.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali0e8cf072f73", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:15:43.651338 env[1818]: 2024-12-13 14:15:43.563 [INFO][5379] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="9b54c2d2c7a66991a186af63a0fea2aaa4b9612969afd62fc0ef6c84e1feeea1" Dec 13 14:15:43.651338 env[1818]: 2024-12-13 14:15:43.563 [INFO][5379] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="9b54c2d2c7a66991a186af63a0fea2aaa4b9612969afd62fc0ef6c84e1feeea1" iface="eth0" netns="" Dec 13 14:15:43.651338 env[1818]: 2024-12-13 14:15:43.563 [INFO][5379] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="9b54c2d2c7a66991a186af63a0fea2aaa4b9612969afd62fc0ef6c84e1feeea1" Dec 13 14:15:43.651338 env[1818]: 2024-12-13 14:15:43.563 [INFO][5379] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="9b54c2d2c7a66991a186af63a0fea2aaa4b9612969afd62fc0ef6c84e1feeea1" Dec 13 14:15:43.651338 env[1818]: 2024-12-13 14:15:43.621 [INFO][5385] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="9b54c2d2c7a66991a186af63a0fea2aaa4b9612969afd62fc0ef6c84e1feeea1" HandleID="k8s-pod-network.9b54c2d2c7a66991a186af63a0fea2aaa4b9612969afd62fc0ef6c84e1feeea1" Workload="ip--172--31--18--231-k8s-coredns--76f75df574--5kblv-eth0" Dec 13 14:15:43.651338 env[1818]: 2024-12-13 14:15:43.622 [INFO][5385] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:15:43.651338 env[1818]: 2024-12-13 14:15:43.622 [INFO][5385] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:15:43.651338 env[1818]: 2024-12-13 14:15:43.636 [WARNING][5385] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="9b54c2d2c7a66991a186af63a0fea2aaa4b9612969afd62fc0ef6c84e1feeea1" HandleID="k8s-pod-network.9b54c2d2c7a66991a186af63a0fea2aaa4b9612969afd62fc0ef6c84e1feeea1" Workload="ip--172--31--18--231-k8s-coredns--76f75df574--5kblv-eth0" Dec 13 14:15:43.651338 env[1818]: 2024-12-13 14:15:43.639 [INFO][5385] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="9b54c2d2c7a66991a186af63a0fea2aaa4b9612969afd62fc0ef6c84e1feeea1" HandleID="k8s-pod-network.9b54c2d2c7a66991a186af63a0fea2aaa4b9612969afd62fc0ef6c84e1feeea1" Workload="ip--172--31--18--231-k8s-coredns--76f75df574--5kblv-eth0" Dec 13 14:15:43.651338 env[1818]: 2024-12-13 14:15:43.642 [INFO][5385] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:15:43.651338 env[1818]: 2024-12-13 14:15:43.645 [INFO][5379] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="9b54c2d2c7a66991a186af63a0fea2aaa4b9612969afd62fc0ef6c84e1feeea1" Dec 13 14:15:43.652368 env[1818]: time="2024-12-13T14:15:43.651378232Z" level=info msg="TearDown network for sandbox \"9b54c2d2c7a66991a186af63a0fea2aaa4b9612969afd62fc0ef6c84e1feeea1\" successfully" Dec 13 14:15:43.667897 env[1818]: time="2024-12-13T14:15:43.667762372Z" level=info msg="RemovePodSandbox \"9b54c2d2c7a66991a186af63a0fea2aaa4b9612969afd62fc0ef6c84e1feeea1\" returns successfully" Dec 13 14:15:43.669044 env[1818]: time="2024-12-13T14:15:43.668952150Z" level=info msg="StopPodSandbox for \"e099ef2e1e3bc483dbe1d9dee04d0daddb09d4c56697af84981172bca0b8a579\"" Dec 13 14:15:43.831483 env[1818]: 2024-12-13 14:15:43.751 [WARNING][5405] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="e099ef2e1e3bc483dbe1d9dee04d0daddb09d4c56697af84981172bca0b8a579" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--18--231-k8s-csi--node--driver--r2mtx-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"598fbb62-2ff1-4c40-b8a5-720bd020a409", ResourceVersion:"870", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 15, 7, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b695c467", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-18-231", ContainerID:"61f5ef52a7faf544c16cba1d3e653763ad2a02a602e536a9835ac431621518ae", Pod:"csi-node-driver-r2mtx", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.34.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali52d66785597", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:15:43.831483 env[1818]: 2024-12-13 14:15:43.752 [INFO][5405] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="e099ef2e1e3bc483dbe1d9dee04d0daddb09d4c56697af84981172bca0b8a579" Dec 13 14:15:43.831483 env[1818]: 2024-12-13 14:15:43.752 [INFO][5405] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="e099ef2e1e3bc483dbe1d9dee04d0daddb09d4c56697af84981172bca0b8a579" iface="eth0" netns="" Dec 13 14:15:43.831483 env[1818]: 2024-12-13 14:15:43.752 [INFO][5405] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="e099ef2e1e3bc483dbe1d9dee04d0daddb09d4c56697af84981172bca0b8a579" Dec 13 14:15:43.831483 env[1818]: 2024-12-13 14:15:43.752 [INFO][5405] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e099ef2e1e3bc483dbe1d9dee04d0daddb09d4c56697af84981172bca0b8a579" Dec 13 14:15:43.831483 env[1818]: 2024-12-13 14:15:43.807 [INFO][5411] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="e099ef2e1e3bc483dbe1d9dee04d0daddb09d4c56697af84981172bca0b8a579" HandleID="k8s-pod-network.e099ef2e1e3bc483dbe1d9dee04d0daddb09d4c56697af84981172bca0b8a579" Workload="ip--172--31--18--231-k8s-csi--node--driver--r2mtx-eth0" Dec 13 14:15:43.831483 env[1818]: 2024-12-13 14:15:43.807 [INFO][5411] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:15:43.831483 env[1818]: 2024-12-13 14:15:43.807 [INFO][5411] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:15:43.831483 env[1818]: 2024-12-13 14:15:43.821 [WARNING][5411] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="e099ef2e1e3bc483dbe1d9dee04d0daddb09d4c56697af84981172bca0b8a579" HandleID="k8s-pod-network.e099ef2e1e3bc483dbe1d9dee04d0daddb09d4c56697af84981172bca0b8a579" Workload="ip--172--31--18--231-k8s-csi--node--driver--r2mtx-eth0" Dec 13 14:15:43.831483 env[1818]: 2024-12-13 14:15:43.821 [INFO][5411] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="e099ef2e1e3bc483dbe1d9dee04d0daddb09d4c56697af84981172bca0b8a579" HandleID="k8s-pod-network.e099ef2e1e3bc483dbe1d9dee04d0daddb09d4c56697af84981172bca0b8a579" Workload="ip--172--31--18--231-k8s-csi--node--driver--r2mtx-eth0" Dec 13 14:15:43.831483 env[1818]: 2024-12-13 14:15:43.824 [INFO][5411] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:15:43.831483 env[1818]: 2024-12-13 14:15:43.826 [INFO][5405] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="e099ef2e1e3bc483dbe1d9dee04d0daddb09d4c56697af84981172bca0b8a579" Dec 13 14:15:43.832808 env[1818]: time="2024-12-13T14:15:43.832749248Z" level=info msg="TearDown network for sandbox \"e099ef2e1e3bc483dbe1d9dee04d0daddb09d4c56697af84981172bca0b8a579\" successfully" Dec 13 14:15:43.833094 env[1818]: time="2024-12-13T14:15:43.833054907Z" level=info msg="StopPodSandbox for \"e099ef2e1e3bc483dbe1d9dee04d0daddb09d4c56697af84981172bca0b8a579\" returns successfully" Dec 13 14:15:43.834120 env[1818]: time="2024-12-13T14:15:43.834062100Z" level=info msg="RemovePodSandbox for \"e099ef2e1e3bc483dbe1d9dee04d0daddb09d4c56697af84981172bca0b8a579\"" Dec 13 14:15:43.834369 env[1818]: time="2024-12-13T14:15:43.834141818Z" level=info msg="Forcibly stopping sandbox \"e099ef2e1e3bc483dbe1d9dee04d0daddb09d4c56697af84981172bca0b8a579\"" Dec 13 14:15:44.012692 env[1818]: 2024-12-13 14:15:43.940 [WARNING][5430] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="e099ef2e1e3bc483dbe1d9dee04d0daddb09d4c56697af84981172bca0b8a579" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--18--231-k8s-csi--node--driver--r2mtx-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"598fbb62-2ff1-4c40-b8a5-720bd020a409", ResourceVersion:"870", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 15, 7, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b695c467", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-18-231", ContainerID:"61f5ef52a7faf544c16cba1d3e653763ad2a02a602e536a9835ac431621518ae", Pod:"csi-node-driver-r2mtx", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.34.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali52d66785597", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:15:44.012692 env[1818]: 2024-12-13 14:15:43.940 [INFO][5430] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="e099ef2e1e3bc483dbe1d9dee04d0daddb09d4c56697af84981172bca0b8a579" Dec 13 14:15:44.012692 env[1818]: 2024-12-13 14:15:43.941 [INFO][5430] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="e099ef2e1e3bc483dbe1d9dee04d0daddb09d4c56697af84981172bca0b8a579" iface="eth0" netns="" Dec 13 14:15:44.012692 env[1818]: 2024-12-13 14:15:43.941 [INFO][5430] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="e099ef2e1e3bc483dbe1d9dee04d0daddb09d4c56697af84981172bca0b8a579" Dec 13 14:15:44.012692 env[1818]: 2024-12-13 14:15:43.941 [INFO][5430] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e099ef2e1e3bc483dbe1d9dee04d0daddb09d4c56697af84981172bca0b8a579" Dec 13 14:15:44.012692 env[1818]: 2024-12-13 14:15:43.987 [INFO][5438] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="e099ef2e1e3bc483dbe1d9dee04d0daddb09d4c56697af84981172bca0b8a579" HandleID="k8s-pod-network.e099ef2e1e3bc483dbe1d9dee04d0daddb09d4c56697af84981172bca0b8a579" Workload="ip--172--31--18--231-k8s-csi--node--driver--r2mtx-eth0" Dec 13 14:15:44.012692 env[1818]: 2024-12-13 14:15:43.987 [INFO][5438] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:15:44.012692 env[1818]: 2024-12-13 14:15:43.987 [INFO][5438] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:15:44.012692 env[1818]: 2024-12-13 14:15:44.004 [WARNING][5438] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="e099ef2e1e3bc483dbe1d9dee04d0daddb09d4c56697af84981172bca0b8a579" HandleID="k8s-pod-network.e099ef2e1e3bc483dbe1d9dee04d0daddb09d4c56697af84981172bca0b8a579" Workload="ip--172--31--18--231-k8s-csi--node--driver--r2mtx-eth0" Dec 13 14:15:44.012692 env[1818]: 2024-12-13 14:15:44.004 [INFO][5438] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="e099ef2e1e3bc483dbe1d9dee04d0daddb09d4c56697af84981172bca0b8a579" HandleID="k8s-pod-network.e099ef2e1e3bc483dbe1d9dee04d0daddb09d4c56697af84981172bca0b8a579" Workload="ip--172--31--18--231-k8s-csi--node--driver--r2mtx-eth0" Dec 13 14:15:44.012692 env[1818]: 2024-12-13 14:15:44.007 [INFO][5438] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:15:44.012692 env[1818]: 2024-12-13 14:15:44.010 [INFO][5430] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="e099ef2e1e3bc483dbe1d9dee04d0daddb09d4c56697af84981172bca0b8a579" Dec 13 14:15:44.014106 env[1818]: time="2024-12-13T14:15:44.014043854Z" level=info msg="TearDown network for sandbox \"e099ef2e1e3bc483dbe1d9dee04d0daddb09d4c56697af84981172bca0b8a579\" successfully" Dec 13 14:15:44.020883 env[1818]: time="2024-12-13T14:15:44.020824332Z" level=info msg="RemovePodSandbox \"e099ef2e1e3bc483dbe1d9dee04d0daddb09d4c56697af84981172bca0b8a579\" returns successfully" Dec 13 14:15:44.022324 env[1818]: time="2024-12-13T14:15:44.022266234Z" level=info msg="StopPodSandbox for \"fd62489a291fe65369fc57679c6a79016dcb022de2a65ff0cb240039c436bada\"" Dec 13 14:15:44.163074 env[1818]: 2024-12-13 14:15:44.097 [WARNING][5458] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="fd62489a291fe65369fc57679c6a79016dcb022de2a65ff0cb240039c436bada" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--18--231-k8s-calico--apiserver--8878db5b5--czf6j-eth0", GenerateName:"calico-apiserver-8878db5b5-", Namespace:"calico-apiserver", SelfLink:"", UID:"8da61845-6202-427b-9fcf-1b4b4a040aed", ResourceVersion:"890", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 15, 5, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"8878db5b5", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-18-231", ContainerID:"2d2df5a0e8b4776829a72158aecfad755a90a20eb96a273f1f00f58b646e262c", Pod:"calico-apiserver-8878db5b5-czf6j", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.34.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali46876c96326", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:15:44.163074 env[1818]: 2024-12-13 14:15:44.098 [INFO][5458] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="fd62489a291fe65369fc57679c6a79016dcb022de2a65ff0cb240039c436bada" Dec 13 14:15:44.163074 env[1818]: 2024-12-13 14:15:44.098 [INFO][5458] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="fd62489a291fe65369fc57679c6a79016dcb022de2a65ff0cb240039c436bada" iface="eth0" netns="" Dec 13 14:15:44.163074 env[1818]: 2024-12-13 14:15:44.098 [INFO][5458] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="fd62489a291fe65369fc57679c6a79016dcb022de2a65ff0cb240039c436bada" Dec 13 14:15:44.163074 env[1818]: 2024-12-13 14:15:44.098 [INFO][5458] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="fd62489a291fe65369fc57679c6a79016dcb022de2a65ff0cb240039c436bada" Dec 13 14:15:44.163074 env[1818]: 2024-12-13 14:15:44.139 [INFO][5464] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="fd62489a291fe65369fc57679c6a79016dcb022de2a65ff0cb240039c436bada" HandleID="k8s-pod-network.fd62489a291fe65369fc57679c6a79016dcb022de2a65ff0cb240039c436bada" Workload="ip--172--31--18--231-k8s-calico--apiserver--8878db5b5--czf6j-eth0" Dec 13 14:15:44.163074 env[1818]: 2024-12-13 14:15:44.139 [INFO][5464] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:15:44.163074 env[1818]: 2024-12-13 14:15:44.139 [INFO][5464] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:15:44.163074 env[1818]: 2024-12-13 14:15:44.154 [WARNING][5464] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="fd62489a291fe65369fc57679c6a79016dcb022de2a65ff0cb240039c436bada" HandleID="k8s-pod-network.fd62489a291fe65369fc57679c6a79016dcb022de2a65ff0cb240039c436bada" Workload="ip--172--31--18--231-k8s-calico--apiserver--8878db5b5--czf6j-eth0" Dec 13 14:15:44.163074 env[1818]: 2024-12-13 14:15:44.154 [INFO][5464] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="fd62489a291fe65369fc57679c6a79016dcb022de2a65ff0cb240039c436bada" HandleID="k8s-pod-network.fd62489a291fe65369fc57679c6a79016dcb022de2a65ff0cb240039c436bada" Workload="ip--172--31--18--231-k8s-calico--apiserver--8878db5b5--czf6j-eth0" Dec 13 14:15:44.163074 env[1818]: 2024-12-13 14:15:44.157 [INFO][5464] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:15:44.163074 env[1818]: 2024-12-13 14:15:44.160 [INFO][5458] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="fd62489a291fe65369fc57679c6a79016dcb022de2a65ff0cb240039c436bada" Dec 13 14:15:44.164294 env[1818]: time="2024-12-13T14:15:44.163112453Z" level=info msg="TearDown network for sandbox \"fd62489a291fe65369fc57679c6a79016dcb022de2a65ff0cb240039c436bada\" successfully" Dec 13 14:15:44.164294 env[1818]: time="2024-12-13T14:15:44.163157922Z" level=info msg="StopPodSandbox for \"fd62489a291fe65369fc57679c6a79016dcb022de2a65ff0cb240039c436bada\" returns successfully" Dec 13 14:15:44.164294 env[1818]: time="2024-12-13T14:15:44.164185756Z" level=info msg="RemovePodSandbox for \"fd62489a291fe65369fc57679c6a79016dcb022de2a65ff0cb240039c436bada\"" Dec 13 14:15:44.164294 env[1818]: time="2024-12-13T14:15:44.164238917Z" level=info msg="Forcibly stopping sandbox \"fd62489a291fe65369fc57679c6a79016dcb022de2a65ff0cb240039c436bada\"" Dec 13 14:15:44.303667 env[1818]: 2024-12-13 14:15:44.238 [WARNING][5483] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="fd62489a291fe65369fc57679c6a79016dcb022de2a65ff0cb240039c436bada" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--18--231-k8s-calico--apiserver--8878db5b5--czf6j-eth0", GenerateName:"calico-apiserver-8878db5b5-", Namespace:"calico-apiserver", SelfLink:"", UID:"8da61845-6202-427b-9fcf-1b4b4a040aed", ResourceVersion:"890", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 15, 5, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"8878db5b5", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-18-231", ContainerID:"2d2df5a0e8b4776829a72158aecfad755a90a20eb96a273f1f00f58b646e262c", Pod:"calico-apiserver-8878db5b5-czf6j", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.34.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali46876c96326", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:15:44.303667 env[1818]: 2024-12-13 14:15:44.239 [INFO][5483] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="fd62489a291fe65369fc57679c6a79016dcb022de2a65ff0cb240039c436bada" Dec 13 14:15:44.303667 env[1818]: 2024-12-13 14:15:44.239 [INFO][5483] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="fd62489a291fe65369fc57679c6a79016dcb022de2a65ff0cb240039c436bada" iface="eth0" netns="" Dec 13 14:15:44.303667 env[1818]: 2024-12-13 14:15:44.239 [INFO][5483] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="fd62489a291fe65369fc57679c6a79016dcb022de2a65ff0cb240039c436bada" Dec 13 14:15:44.303667 env[1818]: 2024-12-13 14:15:44.239 [INFO][5483] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="fd62489a291fe65369fc57679c6a79016dcb022de2a65ff0cb240039c436bada" Dec 13 14:15:44.303667 env[1818]: 2024-12-13 14:15:44.278 [INFO][5489] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="fd62489a291fe65369fc57679c6a79016dcb022de2a65ff0cb240039c436bada" HandleID="k8s-pod-network.fd62489a291fe65369fc57679c6a79016dcb022de2a65ff0cb240039c436bada" Workload="ip--172--31--18--231-k8s-calico--apiserver--8878db5b5--czf6j-eth0" Dec 13 14:15:44.303667 env[1818]: 2024-12-13 14:15:44.278 [INFO][5489] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:15:44.303667 env[1818]: 2024-12-13 14:15:44.279 [INFO][5489] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:15:44.303667 env[1818]: 2024-12-13 14:15:44.294 [WARNING][5489] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="fd62489a291fe65369fc57679c6a79016dcb022de2a65ff0cb240039c436bada" HandleID="k8s-pod-network.fd62489a291fe65369fc57679c6a79016dcb022de2a65ff0cb240039c436bada" Workload="ip--172--31--18--231-k8s-calico--apiserver--8878db5b5--czf6j-eth0" Dec 13 14:15:44.303667 env[1818]: 2024-12-13 14:15:44.294 [INFO][5489] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="fd62489a291fe65369fc57679c6a79016dcb022de2a65ff0cb240039c436bada" HandleID="k8s-pod-network.fd62489a291fe65369fc57679c6a79016dcb022de2a65ff0cb240039c436bada" Workload="ip--172--31--18--231-k8s-calico--apiserver--8878db5b5--czf6j-eth0" Dec 13 14:15:44.303667 env[1818]: 2024-12-13 14:15:44.297 [INFO][5489] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:15:44.303667 env[1818]: 2024-12-13 14:15:44.299 [INFO][5483] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="fd62489a291fe65369fc57679c6a79016dcb022de2a65ff0cb240039c436bada" Dec 13 14:15:44.304685 env[1818]: time="2024-12-13T14:15:44.303709152Z" level=info msg="TearDown network for sandbox \"fd62489a291fe65369fc57679c6a79016dcb022de2a65ff0cb240039c436bada\" successfully" Dec 13 14:15:44.310814 env[1818]: time="2024-12-13T14:15:44.310686877Z" level=info msg="RemovePodSandbox \"fd62489a291fe65369fc57679c6a79016dcb022de2a65ff0cb240039c436bada\" returns successfully" Dec 13 14:15:44.311911 env[1818]: time="2024-12-13T14:15:44.311858006Z" level=info msg="StopPodSandbox for \"7e68373161df4d8c1efce295e827b9367fb698838bb827165039f5e538e06d51\"" Dec 13 14:15:44.469980 env[1818]: 2024-12-13 14:15:44.389 [WARNING][5507] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="7e68373161df4d8c1efce295e827b9367fb698838bb827165039f5e538e06d51" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--18--231-k8s-calico--kube--controllers--747dd4679c--kfxmw-eth0", GenerateName:"calico-kube-controllers-747dd4679c-", Namespace:"calico-system", SelfLink:"", UID:"55f96ceb-5c45-4365-b359-551ac19183ea", ResourceVersion:"877", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 15, 7, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"747dd4679c", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-18-231", ContainerID:"05ef2bae75ec9f93c24c1a295ce3d26c07052bc4cf87733e4585b99bccd7f077", Pod:"calico-kube-controllers-747dd4679c-kfxmw", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.34.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali05ba6d11cd5", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:15:44.469980 env[1818]: 2024-12-13 14:15:44.390 [INFO][5507] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="7e68373161df4d8c1efce295e827b9367fb698838bb827165039f5e538e06d51" Dec 13 14:15:44.469980 env[1818]: 2024-12-13 14:15:44.390 [INFO][5507] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="7e68373161df4d8c1efce295e827b9367fb698838bb827165039f5e538e06d51" iface="eth0" netns="" Dec 13 14:15:44.469980 env[1818]: 2024-12-13 14:15:44.390 [INFO][5507] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="7e68373161df4d8c1efce295e827b9367fb698838bb827165039f5e538e06d51" Dec 13 14:15:44.469980 env[1818]: 2024-12-13 14:15:44.390 [INFO][5507] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="7e68373161df4d8c1efce295e827b9367fb698838bb827165039f5e538e06d51" Dec 13 14:15:44.469980 env[1818]: 2024-12-13 14:15:44.447 [INFO][5514] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="7e68373161df4d8c1efce295e827b9367fb698838bb827165039f5e538e06d51" HandleID="k8s-pod-network.7e68373161df4d8c1efce295e827b9367fb698838bb827165039f5e538e06d51" Workload="ip--172--31--18--231-k8s-calico--kube--controllers--747dd4679c--kfxmw-eth0" Dec 13 14:15:44.469980 env[1818]: 2024-12-13 14:15:44.448 [INFO][5514] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:15:44.469980 env[1818]: 2024-12-13 14:15:44.448 [INFO][5514] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:15:44.469980 env[1818]: 2024-12-13 14:15:44.461 [WARNING][5514] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="7e68373161df4d8c1efce295e827b9367fb698838bb827165039f5e538e06d51" HandleID="k8s-pod-network.7e68373161df4d8c1efce295e827b9367fb698838bb827165039f5e538e06d51" Workload="ip--172--31--18--231-k8s-calico--kube--controllers--747dd4679c--kfxmw-eth0" Dec 13 14:15:44.469980 env[1818]: 2024-12-13 14:15:44.461 [INFO][5514] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="7e68373161df4d8c1efce295e827b9367fb698838bb827165039f5e538e06d51" HandleID="k8s-pod-network.7e68373161df4d8c1efce295e827b9367fb698838bb827165039f5e538e06d51" Workload="ip--172--31--18--231-k8s-calico--kube--controllers--747dd4679c--kfxmw-eth0" Dec 13 14:15:44.469980 env[1818]: 2024-12-13 14:15:44.464 [INFO][5514] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:15:44.469980 env[1818]: 2024-12-13 14:15:44.467 [INFO][5507] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="7e68373161df4d8c1efce295e827b9367fb698838bb827165039f5e538e06d51" Dec 13 14:15:44.469980 env[1818]: time="2024-12-13T14:15:44.469755597Z" level=info msg="TearDown network for sandbox \"7e68373161df4d8c1efce295e827b9367fb698838bb827165039f5e538e06d51\" successfully" Dec 13 14:15:44.469980 env[1818]: time="2024-12-13T14:15:44.469822847Z" level=info msg="StopPodSandbox for \"7e68373161df4d8c1efce295e827b9367fb698838bb827165039f5e538e06d51\" returns successfully" Dec 13 14:15:44.473465 env[1818]: time="2024-12-13T14:15:44.473361001Z" level=info msg="RemovePodSandbox for \"7e68373161df4d8c1efce295e827b9367fb698838bb827165039f5e538e06d51\"" Dec 13 14:15:44.473652 env[1818]: time="2024-12-13T14:15:44.473461335Z" level=info msg="Forcibly stopping sandbox \"7e68373161df4d8c1efce295e827b9367fb698838bb827165039f5e538e06d51\"" Dec 13 14:15:44.643689 env[1818]: 2024-12-13 14:15:44.574 [WARNING][5532] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="7e68373161df4d8c1efce295e827b9367fb698838bb827165039f5e538e06d51" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ip--172--31--18--231-k8s-calico--kube--controllers--747dd4679c--kfxmw-eth0", GenerateName:"calico-kube-controllers-747dd4679c-", Namespace:"calico-system", SelfLink:"", UID:"55f96ceb-5c45-4365-b359-551ac19183ea", ResourceVersion:"877", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 15, 7, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"747dd4679c", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ip-172-31-18-231", ContainerID:"05ef2bae75ec9f93c24c1a295ce3d26c07052bc4cf87733e4585b99bccd7f077", Pod:"calico-kube-controllers-747dd4679c-kfxmw", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.34.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali05ba6d11cd5", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:15:44.643689 env[1818]: 2024-12-13 14:15:44.574 [INFO][5532] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="7e68373161df4d8c1efce295e827b9367fb698838bb827165039f5e538e06d51" Dec 13 14:15:44.643689 env[1818]: 2024-12-13 14:15:44.574 [INFO][5532] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="7e68373161df4d8c1efce295e827b9367fb698838bb827165039f5e538e06d51" iface="eth0" netns="" Dec 13 14:15:44.643689 env[1818]: 2024-12-13 14:15:44.574 [INFO][5532] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="7e68373161df4d8c1efce295e827b9367fb698838bb827165039f5e538e06d51" Dec 13 14:15:44.643689 env[1818]: 2024-12-13 14:15:44.575 [INFO][5532] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="7e68373161df4d8c1efce295e827b9367fb698838bb827165039f5e538e06d51" Dec 13 14:15:44.643689 env[1818]: 2024-12-13 14:15:44.620 [INFO][5538] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="7e68373161df4d8c1efce295e827b9367fb698838bb827165039f5e538e06d51" HandleID="k8s-pod-network.7e68373161df4d8c1efce295e827b9367fb698838bb827165039f5e538e06d51" Workload="ip--172--31--18--231-k8s-calico--kube--controllers--747dd4679c--kfxmw-eth0" Dec 13 14:15:44.643689 env[1818]: 2024-12-13 14:15:44.620 [INFO][5538] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:15:44.643689 env[1818]: 2024-12-13 14:15:44.620 [INFO][5538] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:15:44.643689 env[1818]: 2024-12-13 14:15:44.634 [WARNING][5538] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="7e68373161df4d8c1efce295e827b9367fb698838bb827165039f5e538e06d51" HandleID="k8s-pod-network.7e68373161df4d8c1efce295e827b9367fb698838bb827165039f5e538e06d51" Workload="ip--172--31--18--231-k8s-calico--kube--controllers--747dd4679c--kfxmw-eth0" Dec 13 14:15:44.643689 env[1818]: 2024-12-13 14:15:44.634 [INFO][5538] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="7e68373161df4d8c1efce295e827b9367fb698838bb827165039f5e538e06d51" HandleID="k8s-pod-network.7e68373161df4d8c1efce295e827b9367fb698838bb827165039f5e538e06d51" Workload="ip--172--31--18--231-k8s-calico--kube--controllers--747dd4679c--kfxmw-eth0" Dec 13 14:15:44.643689 env[1818]: 2024-12-13 14:15:44.637 [INFO][5538] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:15:44.643689 env[1818]: 2024-12-13 14:15:44.641 [INFO][5532] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="7e68373161df4d8c1efce295e827b9367fb698838bb827165039f5e538e06d51" Dec 13 14:15:44.644668 env[1818]: time="2024-12-13T14:15:44.643727524Z" level=info msg="TearDown network for sandbox \"7e68373161df4d8c1efce295e827b9367fb698838bb827165039f5e538e06d51\" successfully" Dec 13 14:15:44.651536 env[1818]: time="2024-12-13T14:15:44.651347455Z" level=info msg="RemovePodSandbox \"7e68373161df4d8c1efce295e827b9367fb698838bb827165039f5e538e06d51\" returns successfully" Dec 13 14:15:45.480197 systemd[1]: Started sshd@9-172.31.18.231:22-139.178.89.65:40368.service. Dec 13 14:15:45.479000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.31.18.231:22-139.178.89.65:40368 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:45.669000 audit[5545]: USER_ACCT pid=5545 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:15:45.671732 sshd[5545]: Accepted publickey for core from 139.178.89.65 port 40368 ssh2: RSA SHA256:07jB2DPJgjjhgg3L8Uh349EZ0zHZFrUiRWNbK+Fdo0Q Dec 13 14:15:45.672000 audit[5545]: CRED_ACQ pid=5545 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:15:45.672000 audit[5545]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe59353d0 a2=3 a3=1 items=0 ppid=1 pid=5545 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:45.672000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:15:45.676208 sshd[5545]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:15:45.687985 systemd[1]: Started session-10.scope. Dec 13 14:15:45.688895 systemd-logind[1810]: New session 10 of user core. Dec 13 14:15:45.701000 audit[5545]: USER_START pid=5545 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:15:45.704000 audit[5547]: CRED_ACQ pid=5547 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:15:45.975613 sshd[5545]: pam_unix(sshd:session): session closed for user core Dec 13 14:15:45.978000 audit[5545]: USER_END pid=5545 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:15:45.979000 audit[5545]: CRED_DISP pid=5545 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:15:45.983680 systemd[1]: session-10.scope: Deactivated successfully. Dec 13 14:15:45.985323 systemd-logind[1810]: Session 10 logged out. Waiting for processes to exit. Dec 13 14:15:45.987333 systemd[1]: sshd@9-172.31.18.231:22-139.178.89.65:40368.service: Deactivated successfully. Dec 13 14:15:45.986000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.31.18.231:22-139.178.89.65:40368 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:45.991161 systemd-logind[1810]: Removed session 10. Dec 13 14:15:47.943808 env[1818]: time="2024-12-13T14:15:47.943748749Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:15:47.947570 env[1818]: time="2024-12-13T14:15:47.947513728Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:32c335fdb9d757e7ba6a76a9cfa8d292a5a229101ae7ea37b42f53c28adf2db1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:15:47.951040 env[1818]: time="2024-12-13T14:15:47.950975520Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:15:47.955026 env[1818]: time="2024-12-13T14:15:47.954949267Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:1072d6a98167a14ca361e9ce757733f9bae36d1f1c6a9621ea10934b6b1e10d9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:15:47.958865 env[1818]: time="2024-12-13T14:15:47.957696577Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.1\" returns image reference \"sha256:32c335fdb9d757e7ba6a76a9cfa8d292a5a229101ae7ea37b42f53c28adf2db1\"" Dec 13 14:15:47.965386 env[1818]: time="2024-12-13T14:15:47.961983734Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\"" Dec 13 14:15:48.007873 env[1818]: time="2024-12-13T14:15:48.007804574Z" level=info msg="CreateContainer within sandbox \"05ef2bae75ec9f93c24c1a295ce3d26c07052bc4cf87733e4585b99bccd7f077\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Dec 13 14:15:48.039774 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount135902932.mount: Deactivated successfully. Dec 13 14:15:48.052356 env[1818]: time="2024-12-13T14:15:48.052275602Z" level=info msg="CreateContainer within sandbox \"05ef2bae75ec9f93c24c1a295ce3d26c07052bc4cf87733e4585b99bccd7f077\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"7229709ced1bd250822fb8755b0fa47f6d2169b7dd128fa7731dbdb34347a9f2\"" Dec 13 14:15:48.054930 env[1818]: time="2024-12-13T14:15:48.053667737Z" level=info msg="StartContainer for \"7229709ced1bd250822fb8755b0fa47f6d2169b7dd128fa7731dbdb34347a9f2\"" Dec 13 14:15:48.094584 systemd[1]: Started cri-containerd-7229709ced1bd250822fb8755b0fa47f6d2169b7dd128fa7731dbdb34347a9f2.scope. Dec 13 14:15:48.143467 kernel: kauditd_printk_skb: 47 callbacks suppressed Dec 13 14:15:48.143640 kernel: audit: type=1400 audit(1734099348.136:1339): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:48.136000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:48.136000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:48.155168 kernel: audit: type=1400 audit(1734099348.136:1340): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:48.155295 kernel: audit: type=1400 audit(1734099348.136:1341): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:48.136000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:48.136000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:48.169340 kernel: audit: type=1400 audit(1734099348.136:1342): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:48.169520 kernel: audit: type=1400 audit(1734099348.136:1343): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:48.136000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:48.136000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:48.185706 kernel: audit: type=1400 audit(1734099348.136:1344): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:48.185852 kernel: audit: type=1400 audit(1734099348.136:1345): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:48.136000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:48.136000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:48.203308 kernel: audit: type=1400 audit(1734099348.136:1346): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:48.136000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:48.211609 kernel: audit: type=1400 audit(1734099348.136:1347): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:48.138000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:48.220690 kernel: audit: type=1400 audit(1734099348.138:1348): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:48.138000 audit: BPF prog-id=203 op=LOAD Dec 13 14:15:48.145000 audit[5573]: AVC avc: denied { bpf } for pid=5573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:48.145000 audit[5573]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4883 pid=5573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:48.145000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732323937303963656431626432353038323266623837353562306661 Dec 13 14:15:48.145000 audit[5573]: AVC avc: denied { perfmon } for pid=5573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:48.145000 audit[5573]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4883 pid=5573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:48.145000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732323937303963656431626432353038323266623837353562306661 Dec 13 14:15:48.145000 audit[5573]: AVC avc: denied { bpf } for pid=5573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:48.145000 audit[5573]: AVC avc: denied { bpf } for pid=5573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:48.145000 audit[5573]: AVC avc: denied { bpf } for pid=5573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:48.145000 audit[5573]: AVC avc: denied { perfmon } for pid=5573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:48.145000 audit[5573]: AVC avc: denied { perfmon } for pid=5573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:48.145000 audit[5573]: AVC avc: denied { perfmon } for pid=5573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:48.145000 audit[5573]: AVC avc: denied { perfmon } for pid=5573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:48.145000 audit[5573]: AVC avc: denied { perfmon } for pid=5573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:48.145000 audit[5573]: AVC avc: denied { bpf } for pid=5573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:48.145000 audit[5573]: AVC avc: denied { bpf } for pid=5573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:48.145000 audit: BPF prog-id=204 op=LOAD Dec 13 14:15:48.145000 audit[5573]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4883 pid=5573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:48.145000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732323937303963656431626432353038323266623837353562306661 Dec 13 14:15:48.145000 audit[5573]: AVC avc: denied { bpf } for pid=5573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:48.145000 audit[5573]: AVC avc: denied { bpf } for pid=5573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:48.145000 audit[5573]: AVC avc: denied { perfmon } for pid=5573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:48.145000 audit[5573]: AVC avc: denied { perfmon } for pid=5573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:48.145000 audit[5573]: AVC avc: denied { perfmon } for pid=5573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:48.145000 audit[5573]: AVC avc: denied { perfmon } for pid=5573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:48.145000 audit[5573]: AVC avc: denied { perfmon } for pid=5573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:48.145000 audit[5573]: AVC avc: denied { bpf } for pid=5573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:48.145000 audit[5573]: AVC avc: denied { bpf } for pid=5573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:48.145000 audit: BPF prog-id=205 op=LOAD Dec 13 14:15:48.145000 audit[5573]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4883 pid=5573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:48.145000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732323937303963656431626432353038323266623837353562306661 Dec 13 14:15:48.146000 audit: BPF prog-id=205 op=UNLOAD Dec 13 14:15:48.146000 audit: BPF prog-id=204 op=UNLOAD Dec 13 14:15:48.146000 audit[5573]: AVC avc: denied { bpf } for pid=5573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:48.146000 audit[5573]: AVC avc: denied { bpf } for pid=5573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:48.146000 audit[5573]: AVC avc: denied { bpf } for pid=5573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:48.146000 audit[5573]: AVC avc: denied { perfmon } for pid=5573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:48.146000 audit[5573]: AVC avc: denied { perfmon } for pid=5573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:48.146000 audit[5573]: AVC avc: denied { perfmon } for pid=5573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:48.146000 audit[5573]: AVC avc: denied { perfmon } for pid=5573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:48.146000 audit[5573]: AVC avc: denied { perfmon } for pid=5573 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:48.146000 audit[5573]: AVC avc: denied { bpf } for pid=5573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:48.146000 audit[5573]: AVC avc: denied { bpf } for pid=5573 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:48.146000 audit: BPF prog-id=206 op=LOAD Dec 13 14:15:48.146000 audit[5573]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4883 pid=5573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:48.146000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732323937303963656431626432353038323266623837353562306661 Dec 13 14:15:48.250577 env[1818]: time="2024-12-13T14:15:48.250507897Z" level=info msg="StartContainer for \"7229709ced1bd250822fb8755b0fa47f6d2169b7dd128fa7731dbdb34347a9f2\" returns successfully" Dec 13 14:15:48.303598 env[1818]: time="2024-12-13T14:15:48.303519935Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:15:48.307940 env[1818]: time="2024-12-13T14:15:48.307869792Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:5451b31bd8d0784796fa1204c4ec22975a270e21feadf2c5095fe41a38524c6c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:15:48.311894 env[1818]: time="2024-12-13T14:15:48.311839145Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:15:48.315272 env[1818]: time="2024-12-13T14:15:48.315216130Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:b8c43e264fe52e0c327b0bf3ac882a0224b33bdd7f4ff58a74242da7d9b00486,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:15:48.316344 env[1818]: time="2024-12-13T14:15:48.316295143Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\" returns image reference \"sha256:5451b31bd8d0784796fa1204c4ec22975a270e21feadf2c5095fe41a38524c6c\"" Dec 13 14:15:48.319060 env[1818]: time="2024-12-13T14:15:48.317924007Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\"" Dec 13 14:15:48.333606 env[1818]: time="2024-12-13T14:15:48.333532374Z" level=info msg="CreateContainer within sandbox \"2d2df5a0e8b4776829a72158aecfad755a90a20eb96a273f1f00f58b646e262c\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Dec 13 14:15:48.367811 env[1818]: time="2024-12-13T14:15:48.367742843Z" level=info msg="CreateContainer within sandbox \"2d2df5a0e8b4776829a72158aecfad755a90a20eb96a273f1f00f58b646e262c\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"5a476f90bd58f033a34a63e63d328891b3304a1d947fb382c36ccf0691839818\"" Dec 13 14:15:48.369404 env[1818]: time="2024-12-13T14:15:48.369333342Z" level=info msg="StartContainer for \"5a476f90bd58f033a34a63e63d328891b3304a1d947fb382c36ccf0691839818\"" Dec 13 14:15:48.423670 systemd[1]: Started cri-containerd-5a476f90bd58f033a34a63e63d328891b3304a1d947fb382c36ccf0691839818.scope. Dec 13 14:15:48.489000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:48.489000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:48.489000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:48.489000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:48.489000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:48.489000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:48.489000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:48.489000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:48.489000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:48.489000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:48.489000 audit: BPF prog-id=207 op=LOAD Dec 13 14:15:48.490000 audit[5608]: AVC avc: denied { bpf } for pid=5608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:48.490000 audit[5608]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=5009 pid=5608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:48.490000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561343736663930626435386630333361333461363365363364333238 Dec 13 14:15:48.490000 audit[5608]: AVC avc: denied { perfmon } for pid=5608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:48.490000 audit[5608]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=5009 pid=5608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:48.490000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561343736663930626435386630333361333461363365363364333238 Dec 13 14:15:48.490000 audit[5608]: AVC avc: denied { bpf } for pid=5608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:48.490000 audit[5608]: AVC avc: denied { bpf } for pid=5608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:48.490000 audit[5608]: AVC avc: denied { bpf } for pid=5608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:48.490000 audit[5608]: AVC avc: denied { perfmon } for pid=5608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:48.490000 audit[5608]: AVC avc: denied { perfmon } for pid=5608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:48.490000 audit[5608]: AVC avc: denied { perfmon } for pid=5608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:48.490000 audit[5608]: AVC avc: denied { perfmon } for pid=5608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:48.490000 audit[5608]: AVC avc: denied { perfmon } for pid=5608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:48.490000 audit[5608]: AVC avc: denied { bpf } for pid=5608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:48.490000 audit[5608]: AVC avc: denied { bpf } for pid=5608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:48.490000 audit: BPF prog-id=208 op=LOAD Dec 13 14:15:48.490000 audit[5608]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=5009 pid=5608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:48.490000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561343736663930626435386630333361333461363365363364333238 Dec 13 14:15:48.491000 audit[5608]: AVC avc: denied { bpf } for pid=5608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:48.491000 audit[5608]: AVC avc: denied { bpf } for pid=5608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:48.491000 audit[5608]: AVC avc: denied { perfmon } for pid=5608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:48.491000 audit[5608]: AVC avc: denied { perfmon } for pid=5608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:48.491000 audit[5608]: AVC avc: denied { perfmon } for pid=5608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:48.491000 audit[5608]: AVC avc: denied { perfmon } for pid=5608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:48.491000 audit[5608]: AVC avc: denied { perfmon } for pid=5608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:48.491000 audit[5608]: AVC avc: denied { bpf } for pid=5608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:48.491000 audit[5608]: AVC avc: denied { bpf } for pid=5608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:48.491000 audit: BPF prog-id=209 op=LOAD Dec 13 14:15:48.491000 audit[5608]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=5009 pid=5608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:48.491000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561343736663930626435386630333361333461363365363364333238 Dec 13 14:15:48.495000 audit: BPF prog-id=209 op=UNLOAD Dec 13 14:15:48.495000 audit: BPF prog-id=208 op=UNLOAD Dec 13 14:15:48.495000 audit[5608]: AVC avc: denied { bpf } for pid=5608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:48.495000 audit[5608]: AVC avc: denied { bpf } for pid=5608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:48.495000 audit[5608]: AVC avc: denied { bpf } for pid=5608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:48.495000 audit[5608]: AVC avc: denied { perfmon } for pid=5608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:48.495000 audit[5608]: AVC avc: denied { perfmon } for pid=5608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:48.495000 audit[5608]: AVC avc: denied { perfmon } for pid=5608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:48.495000 audit[5608]: AVC avc: denied { perfmon } for pid=5608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:48.495000 audit[5608]: AVC avc: denied { perfmon } for pid=5608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:48.495000 audit[5608]: AVC avc: denied { bpf } for pid=5608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:48.495000 audit[5608]: AVC avc: denied { bpf } for pid=5608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:48.495000 audit: BPF prog-id=210 op=LOAD Dec 13 14:15:48.495000 audit[5608]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=5009 pid=5608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:48.495000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561343736663930626435386630333361333461363365363364333238 Dec 13 14:15:48.542725 env[1818]: time="2024-12-13T14:15:48.542657161Z" level=info msg="StartContainer for \"5a476f90bd58f033a34a63e63d328891b3304a1d947fb382c36ccf0691839818\" returns successfully" Dec 13 14:15:48.915863 kubelet[3066]: I1213 14:15:48.915800 3066 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-8878db5b5-qh9tk" podStartSLOduration=38.201506905 podStartE2EDuration="43.915734401s" podCreationTimestamp="2024-12-13 14:15:05 +0000 UTC" firstStartedPulling="2024-12-13 14:15:34.778637169 +0000 UTC m=+52.620910622" lastFinishedPulling="2024-12-13 14:15:40.492864605 +0000 UTC m=+58.335138118" observedRunningTime="2024-12-13 14:15:40.85517478 +0000 UTC m=+58.697448245" watchObservedRunningTime="2024-12-13 14:15:48.915734401 +0000 UTC m=+66.758007854" Dec 13 14:15:48.960246 kubelet[3066]: I1213 14:15:48.960185 3066 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-747dd4679c-kfxmw" podStartSLOduration=32.163893507 podStartE2EDuration="41.960120252s" podCreationTimestamp="2024-12-13 14:15:07 +0000 UTC" firstStartedPulling="2024-12-13 14:15:38.163230795 +0000 UTC m=+56.005504248" lastFinishedPulling="2024-12-13 14:15:47.95945748 +0000 UTC m=+65.801730993" observedRunningTime="2024-12-13 14:15:48.918458502 +0000 UTC m=+66.760731967" watchObservedRunningTime="2024-12-13 14:15:48.960120252 +0000 UTC m=+66.802393705" Dec 13 14:15:49.124000 audit[5656]: NETFILTER_CFG table=filter:117 family=2 entries=10 op=nft_register_rule pid=5656 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:15:49.124000 audit[5656]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=fffff7963b10 a2=0 a3=1 items=0 ppid=3199 pid=5656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:49.124000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:15:49.132000 audit[5656]: NETFILTER_CFG table=nat:118 family=2 entries=20 op=nft_register_rule pid=5656 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:15:49.132000 audit[5656]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=fffff7963b10 a2=0 a3=1 items=0 ppid=3199 pid=5656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:49.132000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:15:49.188772 kubelet[3066]: I1213 14:15:49.188601 3066 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-8878db5b5-czf6j" podStartSLOduration=35.091687597 podStartE2EDuration="44.188539755s" podCreationTimestamp="2024-12-13 14:15:05 +0000 UTC" firstStartedPulling="2024-12-13 14:15:39.22059118 +0000 UTC m=+57.062864633" lastFinishedPulling="2024-12-13 14:15:48.317443338 +0000 UTC m=+66.159716791" observedRunningTime="2024-12-13 14:15:48.968361808 +0000 UTC m=+66.810635297" watchObservedRunningTime="2024-12-13 14:15:49.188539755 +0000 UTC m=+67.030813232" Dec 13 14:15:49.886464 kubelet[3066]: I1213 14:15:49.886026 3066 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 14:15:50.178751 env[1818]: time="2024-12-13T14:15:50.178566643Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:15:50.181374 env[1818]: time="2024-12-13T14:15:50.181290730Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3eb557f7694f230afd24a75a691bcda4c0a7bfe87a981386dcd4ecf2b0701349,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:15:50.186683 env[1818]: time="2024-12-13T14:15:50.186621914Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:15:50.189708 env[1818]: time="2024-12-13T14:15:50.189647051Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:a338da9488cbaa83c78457c3d7354d84149969c0480e88dd768e036632ff5b76,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:15:50.190976 env[1818]: time="2024-12-13T14:15:50.190930931Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\" returns image reference \"sha256:3eb557f7694f230afd24a75a691bcda4c0a7bfe87a981386dcd4ecf2b0701349\"" Dec 13 14:15:50.199787 env[1818]: time="2024-12-13T14:15:50.199734224Z" level=info msg="CreateContainer within sandbox \"61f5ef52a7faf544c16cba1d3e653763ad2a02a602e536a9835ac431621518ae\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Dec 13 14:15:50.227275 env[1818]: time="2024-12-13T14:15:50.227175067Z" level=info msg="CreateContainer within sandbox \"61f5ef52a7faf544c16cba1d3e653763ad2a02a602e536a9835ac431621518ae\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"581cc6fe785b6ea280b9adeec44a86d9cbe47c2fa84be0ddfe99cd608e0fd18c\"" Dec 13 14:15:50.228857 env[1818]: time="2024-12-13T14:15:50.228773725Z" level=info msg="StartContainer for \"581cc6fe785b6ea280b9adeec44a86d9cbe47c2fa84be0ddfe99cd608e0fd18c\"" Dec 13 14:15:50.310228 systemd[1]: Started cri-containerd-581cc6fe785b6ea280b9adeec44a86d9cbe47c2fa84be0ddfe99cd608e0fd18c.scope. Dec 13 14:15:50.352000 audit[5670]: AVC avc: denied { perfmon } for pid=5670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:50.352000 audit[5670]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=4836 pid=5670 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:50.352000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538316363366665373835623665613238306239616465656334346138 Dec 13 14:15:50.352000 audit[5670]: AVC avc: denied { bpf } for pid=5670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:50.352000 audit[5670]: AVC avc: denied { bpf } for pid=5670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:50.352000 audit[5670]: AVC avc: denied { bpf } for pid=5670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:50.352000 audit[5670]: AVC avc: denied { perfmon } for pid=5670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:50.352000 audit[5670]: AVC avc: denied { perfmon } for pid=5670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:50.352000 audit[5670]: AVC avc: denied { perfmon } for pid=5670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:50.352000 audit[5670]: AVC avc: denied { perfmon } for pid=5670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:50.352000 audit[5670]: AVC avc: denied { perfmon } for pid=5670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:50.352000 audit[5670]: AVC avc: denied { bpf } for pid=5670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:50.352000 audit[5670]: AVC avc: denied { bpf } for pid=5670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:50.352000 audit: BPF prog-id=211 op=LOAD Dec 13 14:15:50.352000 audit[5670]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=4836 pid=5670 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:50.352000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538316363366665373835623665613238306239616465656334346138 Dec 13 14:15:50.353000 audit[5670]: AVC avc: denied { bpf } for pid=5670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:50.353000 audit[5670]: AVC avc: denied { bpf } for pid=5670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:50.353000 audit[5670]: AVC avc: denied { perfmon } for pid=5670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:50.353000 audit[5670]: AVC avc: denied { perfmon } for pid=5670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:50.353000 audit[5670]: AVC avc: denied { perfmon } for pid=5670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:50.353000 audit[5670]: AVC avc: denied { perfmon } for pid=5670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:50.353000 audit[5670]: AVC avc: denied { perfmon } for pid=5670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:50.353000 audit[5670]: AVC avc: denied { bpf } for pid=5670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:50.353000 audit[5670]: AVC avc: denied { bpf } for pid=5670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:50.353000 audit: BPF prog-id=212 op=LOAD Dec 13 14:15:50.353000 audit[5670]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=4836 pid=5670 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:50.353000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538316363366665373835623665613238306239616465656334346138 Dec 13 14:15:50.353000 audit: BPF prog-id=212 op=UNLOAD Dec 13 14:15:50.353000 audit: BPF prog-id=211 op=UNLOAD Dec 13 14:15:50.353000 audit[5670]: AVC avc: denied { bpf } for pid=5670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:50.353000 audit[5670]: AVC avc: denied { bpf } for pid=5670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:50.353000 audit[5670]: AVC avc: denied { bpf } for pid=5670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:50.353000 audit[5670]: AVC avc: denied { perfmon } for pid=5670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:50.353000 audit[5670]: AVC avc: denied { perfmon } for pid=5670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:50.353000 audit[5670]: AVC avc: denied { perfmon } for pid=5670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:50.353000 audit[5670]: AVC avc: denied { perfmon } for pid=5670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:50.353000 audit[5670]: AVC avc: denied { perfmon } for pid=5670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:50.353000 audit[5670]: AVC avc: denied { bpf } for pid=5670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:50.353000 audit[5670]: AVC avc: denied { bpf } for pid=5670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:15:50.353000 audit: BPF prog-id=213 op=LOAD Dec 13 14:15:50.353000 audit[5670]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=4836 pid=5670 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:50.353000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538316363366665373835623665613238306239616465656334346138 Dec 13 14:15:50.391879 env[1818]: time="2024-12-13T14:15:50.391817126Z" level=info msg="StartContainer for \"581cc6fe785b6ea280b9adeec44a86d9cbe47c2fa84be0ddfe99cd608e0fd18c\" returns successfully" Dec 13 14:15:50.668593 kubelet[3066]: I1213 14:15:50.668551 3066 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Dec 13 14:15:50.669225 kubelet[3066]: I1213 14:15:50.669200 3066 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Dec 13 14:15:50.915319 kubelet[3066]: I1213 14:15:50.915266 3066 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-r2mtx" podStartSLOduration=31.790886414 podStartE2EDuration="43.915200015s" podCreationTimestamp="2024-12-13 14:15:07 +0000 UTC" firstStartedPulling="2024-12-13 14:15:38.06748905 +0000 UTC m=+55.909762491" lastFinishedPulling="2024-12-13 14:15:50.191802639 +0000 UTC m=+68.034076092" observedRunningTime="2024-12-13 14:15:50.913651674 +0000 UTC m=+68.755925151" watchObservedRunningTime="2024-12-13 14:15:50.915200015 +0000 UTC m=+68.757473468" Dec 13 14:15:51.007534 systemd[1]: Started sshd@10-172.31.18.231:22-139.178.89.65:33522.service. Dec 13 14:15:51.007000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-172.31.18.231:22-139.178.89.65:33522 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:51.078000 audit[5618]: AVC avc: denied { watch } for pid=5618 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_14_15_20.1259537782/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c163,c497 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c163,c497 tclass=file permissive=0 Dec 13 14:15:51.078000 audit[5618]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=4000799920 a2=fc6 a3=0 items=0 ppid=5009 pid=5618 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c163,c497 key=(null) Dec 13 14:15:51.078000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 14:15:51.217000 audit[5702]: USER_ACCT pid=5702 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:15:51.219256 sshd[5702]: Accepted publickey for core from 139.178.89.65 port 33522 ssh2: RSA SHA256:07jB2DPJgjjhgg3L8Uh349EZ0zHZFrUiRWNbK+Fdo0Q Dec 13 14:15:51.220000 audit[5702]: CRED_ACQ pid=5702 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:15:51.220000 audit[5702]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffce3e49d0 a2=3 a3=1 items=0 ppid=1 pid=5702 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:51.220000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:15:51.223393 sshd[5702]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:15:51.231512 systemd-logind[1810]: New session 11 of user core. Dec 13 14:15:51.239270 systemd[1]: Started session-11.scope. Dec 13 14:15:51.248000 audit[5702]: USER_START pid=5702 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:15:51.251000 audit[5722]: CRED_ACQ pid=5722 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:15:51.497609 sshd[5702]: pam_unix(sshd:session): session closed for user core Dec 13 14:15:51.498000 audit[5702]: USER_END pid=5702 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:15:51.498000 audit[5702]: CRED_DISP pid=5702 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:15:51.502773 systemd-logind[1810]: Session 11 logged out. Waiting for processes to exit. Dec 13 14:15:51.504000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-172.31.18.231:22-139.178.89.65:33522 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:51.505157 systemd[1]: sshd@10-172.31.18.231:22-139.178.89.65:33522.service: Deactivated successfully. Dec 13 14:15:51.507334 systemd[1]: session-11.scope: Deactivated successfully. Dec 13 14:15:51.508589 systemd-logind[1810]: Removed session 11. Dec 13 14:15:51.526304 systemd[1]: Started sshd@11-172.31.18.231:22-139.178.89.65:33534.service. Dec 13 14:15:51.525000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-172.31.18.231:22-139.178.89.65:33534 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:51.692000 audit[5733]: USER_ACCT pid=5733 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:15:51.694582 sshd[5733]: Accepted publickey for core from 139.178.89.65 port 33534 ssh2: RSA SHA256:07jB2DPJgjjhgg3L8Uh349EZ0zHZFrUiRWNbK+Fdo0Q Dec 13 14:15:51.694000 audit[5733]: CRED_ACQ pid=5733 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:15:51.695000 audit[5733]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffefd0a60 a2=3 a3=1 items=0 ppid=1 pid=5733 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:51.695000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:15:51.697840 sshd[5733]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:15:51.706543 systemd-logind[1810]: New session 12 of user core. Dec 13 14:15:51.707091 systemd[1]: Started session-12.scope. Dec 13 14:15:51.715000 audit[5733]: USER_START pid=5733 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:15:51.718000 audit[5735]: CRED_ACQ pid=5735 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:15:52.046727 sshd[5733]: pam_unix(sshd:session): session closed for user core Dec 13 14:15:52.047000 audit[5733]: USER_END pid=5733 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:15:52.047000 audit[5733]: CRED_DISP pid=5733 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:15:52.051000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-172.31.18.231:22-139.178.89.65:33534 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:52.052154 systemd-logind[1810]: Session 12 logged out. Waiting for processes to exit. Dec 13 14:15:52.052692 systemd[1]: sshd@11-172.31.18.231:22-139.178.89.65:33534.service: Deactivated successfully. Dec 13 14:15:52.054078 systemd[1]: session-12.scope: Deactivated successfully. Dec 13 14:15:52.058883 systemd-logind[1810]: Removed session 12. Dec 13 14:15:52.083000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.31.18.231:22-139.178.89.65:33542 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:52.084744 systemd[1]: Started sshd@12-172.31.18.231:22-139.178.89.65:33542.service. Dec 13 14:15:52.254000 audit[5743]: USER_ACCT pid=5743 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:15:52.256689 sshd[5743]: Accepted publickey for core from 139.178.89.65 port 33542 ssh2: RSA SHA256:07jB2DPJgjjhgg3L8Uh349EZ0zHZFrUiRWNbK+Fdo0Q Dec 13 14:15:52.257000 audit[5743]: CRED_ACQ pid=5743 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:15:52.257000 audit[5743]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd0bea4d0 a2=3 a3=1 items=0 ppid=1 pid=5743 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:52.257000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:15:52.259987 sshd[5743]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:15:52.267084 systemd-logind[1810]: New session 13 of user core. Dec 13 14:15:52.269102 systemd[1]: Started session-13.scope. Dec 13 14:15:52.277000 audit[5743]: USER_START pid=5743 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:15:52.280000 audit[5745]: CRED_ACQ pid=5745 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:15:52.531535 sshd[5743]: pam_unix(sshd:session): session closed for user core Dec 13 14:15:52.532000 audit[5743]: USER_END pid=5743 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:15:52.532000 audit[5743]: CRED_DISP pid=5743 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:15:52.536732 systemd[1]: session-13.scope: Deactivated successfully. Dec 13 14:15:52.537913 systemd[1]: sshd@12-172.31.18.231:22-139.178.89.65:33542.service: Deactivated successfully. Dec 13 14:15:52.536000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.31.18.231:22-139.178.89.65:33542 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:52.539913 systemd-logind[1810]: Session 13 logged out. Waiting for processes to exit. Dec 13 14:15:52.541991 systemd-logind[1810]: Removed session 13. Dec 13 14:15:53.631000 audit[2664]: AVC avc: denied { watch } for pid=2664 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=8270 scontext=system_u:system_r:svirt_lxc_net_t:s0:c127,c295 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:15:53.634443 kernel: kauditd_printk_skb: 189 callbacks suppressed Dec 13 14:15:53.634574 kernel: audit: type=1400 audit(1734099353.631:1411): avc: denied { watch } for pid=2664 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=8270 scontext=system_u:system_r:svirt_lxc_net_t:s0:c127,c295 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:15:53.631000 audit[2664]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40021fcf00 a2=fc6 a3=0 items=0 ppid=2518 pid=2664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c127,c295 key=(null) Dec 13 14:15:53.654690 kernel: audit: type=1300 audit(1734099353.631:1411): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40021fcf00 a2=fc6 a3=0 items=0 ppid=2518 pid=2664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c127,c295 key=(null) Dec 13 14:15:53.654831 kernel: audit: type=1327 audit(1734099353.631:1411): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:15:53.631000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:15:53.633000 audit[2664]: AVC avc: denied { watch } for pid=2664 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=8270 scontext=system_u:system_r:svirt_lxc_net_t:s0:c127,c295 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:15:53.673302 kernel: audit: type=1400 audit(1734099353.633:1412): avc: denied { watch } for pid=2664 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=8270 scontext=system_u:system_r:svirt_lxc_net_t:s0:c127,c295 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:15:53.676719 kernel: audit: type=1300 audit(1734099353.633:1412): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40021fcf20 a2=fc6 a3=0 items=0 ppid=2518 pid=2664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c127,c295 key=(null) Dec 13 14:15:53.633000 audit[2664]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40021fcf20 a2=fc6 a3=0 items=0 ppid=2518 pid=2664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c127,c295 key=(null) Dec 13 14:15:53.633000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:15:53.696470 kernel: audit: type=1327 audit(1734099353.633:1412): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:15:53.696686 kernel: audit: type=1400 audit(1734099353.633:1413): avc: denied { watch } for pid=2664 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=8270 scontext=system_u:system_r:svirt_lxc_net_t:s0:c127,c295 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:15:53.633000 audit[2664]: AVC avc: denied { watch } for pid=2664 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=8270 scontext=system_u:system_r:svirt_lxc_net_t:s0:c127,c295 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:15:53.633000 audit[2664]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40021fd0c0 a2=fc6 a3=0 items=0 ppid=2518 pid=2664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c127,c295 key=(null) Dec 13 14:15:53.717007 kernel: audit: type=1300 audit(1734099353.633:1413): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40021fd0c0 a2=fc6 a3=0 items=0 ppid=2518 pid=2664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c127,c295 key=(null) Dec 13 14:15:53.717190 kernel: audit: type=1327 audit(1734099353.633:1413): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:15:53.633000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:15:53.633000 audit[2664]: AVC avc: denied { watch } for pid=2664 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=8270 scontext=system_u:system_r:svirt_lxc_net_t:s0:c127,c295 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:15:53.735520 kernel: audit: type=1400 audit(1734099353.633:1414): avc: denied { watch } for pid=2664 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=8270 scontext=system_u:system_r:svirt_lxc_net_t:s0:c127,c295 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:15:53.633000 audit[2664]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40021fd0e0 a2=fc6 a3=0 items=0 ppid=2518 pid=2664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c127,c295 key=(null) Dec 13 14:15:53.633000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:15:54.897759 kubelet[3066]: I1213 14:15:54.897676 3066 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 14:15:54.974000 audit[5755]: NETFILTER_CFG table=filter:119 family=2 entries=9 op=nft_register_rule pid=5755 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:15:54.974000 audit[5755]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffc79593b0 a2=0 a3=1 items=0 ppid=3199 pid=5755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:54.974000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:15:54.980000 audit[5755]: NETFILTER_CFG table=nat:120 family=2 entries=27 op=nft_register_chain pid=5755 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:15:54.980000 audit[5755]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=9348 a0=3 a1=ffffc79593b0 a2=0 a3=1 items=0 ppid=3199 pid=5755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:54.980000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:15:57.304560 kubelet[3066]: I1213 14:15:57.304506 3066 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 14:15:57.381000 audit[5765]: NETFILTER_CFG table=filter:121 family=2 entries=8 op=nft_register_rule pid=5765 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:15:57.381000 audit[5765]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffcc4e2160 a2=0 a3=1 items=0 ppid=3199 pid=5765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:57.381000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:15:57.391000 audit[5765]: NETFILTER_CFG table=nat:122 family=2 entries=34 op=nft_register_chain pid=5765 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:15:57.391000 audit[5765]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11236 a0=3 a1=ffffcc4e2160 a2=0 a3=1 items=0 ppid=3199 pid=5765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:57.391000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:15:57.561000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-172.31.18.231:22-139.178.89.65:33550 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:57.561599 systemd[1]: Started sshd@13-172.31.18.231:22-139.178.89.65:33550.service. Dec 13 14:15:57.731000 audit[5767]: USER_ACCT pid=5767 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:15:57.733732 sshd[5767]: Accepted publickey for core from 139.178.89.65 port 33550 ssh2: RSA SHA256:07jB2DPJgjjhgg3L8Uh349EZ0zHZFrUiRWNbK+Fdo0Q Dec 13 14:15:57.734000 audit[5767]: CRED_ACQ pid=5767 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:15:57.734000 audit[5767]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdd533a90 a2=3 a3=1 items=0 ppid=1 pid=5767 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:15:57.734000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:15:57.735352 sshd[5767]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:15:57.745150 systemd[1]: Started session-14.scope. Dec 13 14:15:57.745943 systemd-logind[1810]: New session 14 of user core. Dec 13 14:15:57.755000 audit[5767]: USER_START pid=5767 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:15:57.757000 audit[5769]: CRED_ACQ pid=5769 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:15:58.015856 sshd[5767]: pam_unix(sshd:session): session closed for user core Dec 13 14:15:58.018000 audit[5767]: USER_END pid=5767 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:15:58.018000 audit[5767]: CRED_DISP pid=5767 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:15:58.022462 systemd[1]: sshd@13-172.31.18.231:22-139.178.89.65:33550.service: Deactivated successfully. Dec 13 14:15:58.022000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-172.31.18.231:22-139.178.89.65:33550 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:15:58.023924 systemd[1]: session-14.scope: Deactivated successfully. Dec 13 14:15:58.025201 systemd-logind[1810]: Session 14 logged out. Waiting for processes to exit. Dec 13 14:15:58.028696 systemd-logind[1810]: Removed session 14. Dec 13 14:16:03.047725 systemd[1]: Started sshd@14-172.31.18.231:22-139.178.89.65:50934.service. Dec 13 14:16:03.059330 kernel: kauditd_printk_skb: 25 callbacks suppressed Dec 13 14:16:03.059511 kernel: audit: type=1130 audit(1734099363.048:1428): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.31.18.231:22-139.178.89.65:50934 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:03.048000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.31.18.231:22-139.178.89.65:50934 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:03.226000 audit[5807]: USER_ACCT pid=5807 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:03.227840 sshd[5807]: Accepted publickey for core from 139.178.89.65 port 50934 ssh2: RSA SHA256:07jB2DPJgjjhgg3L8Uh349EZ0zHZFrUiRWNbK+Fdo0Q Dec 13 14:16:03.240481 kernel: audit: type=1101 audit(1734099363.226:1429): pid=5807 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:03.240000 audit[5807]: CRED_ACQ pid=5807 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:03.244163 sshd[5807]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:16:03.265261 kernel: audit: type=1103 audit(1734099363.240:1430): pid=5807 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:03.265479 kernel: audit: type=1006 audit(1734099363.240:1431): pid=5807 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 Dec 13 14:16:03.267686 systemd[1]: Started session-15.scope. Dec 13 14:16:03.268048 systemd-logind[1810]: New session 15 of user core. Dec 13 14:16:03.240000 audit[5807]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff8680e80 a2=3 a3=1 items=0 ppid=1 pid=5807 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:03.279043 kernel: audit: type=1300 audit(1734099363.240:1431): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff8680e80 a2=3 a3=1 items=0 ppid=1 pid=5807 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:03.240000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:16:03.282555 kernel: audit: type=1327 audit(1734099363.240:1431): proctitle=737368643A20636F7265205B707269765D Dec 13 14:16:03.290000 audit[5807]: USER_START pid=5807 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:03.303157 kernel: audit: type=1105 audit(1734099363.290:1432): pid=5807 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:03.303302 kernel: audit: type=1103 audit(1734099363.301:1433): pid=5811 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:03.301000 audit[5811]: CRED_ACQ pid=5811 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:03.562849 sshd[5807]: pam_unix(sshd:session): session closed for user core Dec 13 14:16:03.564000 audit[5807]: USER_END pid=5807 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:03.566000 audit[5807]: CRED_DISP pid=5807 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:03.586098 kernel: audit: type=1106 audit(1734099363.564:1434): pid=5807 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:03.586229 kernel: audit: type=1104 audit(1734099363.566:1435): pid=5807 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:03.576819 systemd[1]: sshd@14-172.31.18.231:22-139.178.89.65:50934.service: Deactivated successfully. Dec 13 14:16:03.578150 systemd[1]: session-15.scope: Deactivated successfully. Dec 13 14:16:03.585499 systemd-logind[1810]: Session 15 logged out. Waiting for processes to exit. Dec 13 14:16:03.576000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.31.18.231:22-139.178.89.65:50934 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:03.587388 systemd-logind[1810]: Removed session 15. Dec 13 14:16:08.593000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.31.18.231:22-139.178.89.65:45034 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:08.593123 systemd[1]: Started sshd@15-172.31.18.231:22-139.178.89.65:45034.service. Dec 13 14:16:08.595224 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 14:16:08.595296 kernel: audit: type=1130 audit(1734099368.593:1437): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.31.18.231:22-139.178.89.65:45034 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:08.764000 audit[5820]: USER_ACCT pid=5820 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:08.767891 sshd[5820]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:16:08.769042 sshd[5820]: Accepted publickey for core from 139.178.89.65 port 45034 ssh2: RSA SHA256:07jB2DPJgjjhgg3L8Uh349EZ0zHZFrUiRWNbK+Fdo0Q Dec 13 14:16:08.766000 audit[5820]: CRED_ACQ pid=5820 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:08.783404 kernel: audit: type=1101 audit(1734099368.764:1438): pid=5820 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:08.783556 kernel: audit: type=1103 audit(1734099368.766:1439): pid=5820 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:08.789877 kernel: audit: type=1006 audit(1734099368.766:1440): pid=5820 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Dec 13 14:16:08.790130 kernel: audit: type=1300 audit(1734099368.766:1440): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd593f620 a2=3 a3=1 items=0 ppid=1 pid=5820 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:08.766000 audit[5820]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd593f620 a2=3 a3=1 items=0 ppid=1 pid=5820 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:08.766000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:16:08.802727 kernel: audit: type=1327 audit(1734099368.766:1440): proctitle=737368643A20636F7265205B707269765D Dec 13 14:16:08.808518 systemd-logind[1810]: New session 16 of user core. Dec 13 14:16:08.810101 systemd[1]: Started session-16.scope. Dec 13 14:16:08.820000 audit[5820]: USER_START pid=5820 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:08.831000 audit[5823]: CRED_ACQ pid=5823 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:08.840517 kernel: audit: type=1105 audit(1734099368.820:1441): pid=5820 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:08.840652 kernel: audit: type=1103 audit(1734099368.831:1442): pid=5823 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:09.092828 sshd[5820]: pam_unix(sshd:session): session closed for user core Dec 13 14:16:09.095000 audit[5820]: USER_END pid=5820 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:09.107097 systemd[1]: sshd@15-172.31.18.231:22-139.178.89.65:45034.service: Deactivated successfully. Dec 13 14:16:09.108480 systemd[1]: session-16.scope: Deactivated successfully. Dec 13 14:16:09.095000 audit[5820]: CRED_DISP pid=5820 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:09.111599 systemd-logind[1810]: Session 16 logged out. Waiting for processes to exit. Dec 13 14:16:09.120267 kernel: audit: type=1106 audit(1734099369.095:1443): pid=5820 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:09.120434 kernel: audit: type=1104 audit(1734099369.095:1444): pid=5820 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:09.107000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.31.18.231:22-139.178.89.65:45034 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:09.121586 systemd-logind[1810]: Removed session 16. Dec 13 14:16:14.122914 systemd[1]: Started sshd@16-172.31.18.231:22-139.178.89.65:45050.service. Dec 13 14:16:14.123000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-172.31.18.231:22-139.178.89.65:45050 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:14.125702 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 14:16:14.125811 kernel: audit: type=1130 audit(1734099374.123:1446): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-172.31.18.231:22-139.178.89.65:45050 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:14.299000 audit[5835]: USER_ACCT pid=5835 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:14.300136 sshd[5835]: Accepted publickey for core from 139.178.89.65 port 45050 ssh2: RSA SHA256:07jB2DPJgjjhgg3L8Uh349EZ0zHZFrUiRWNbK+Fdo0Q Dec 13 14:16:14.311989 sshd[5835]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:16:14.310000 audit[5835]: CRED_ACQ pid=5835 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:14.321572 kernel: audit: type=1101 audit(1734099374.299:1447): pid=5835 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:14.321695 kernel: audit: type=1103 audit(1734099374.310:1448): pid=5835 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:14.329711 kernel: audit: type=1006 audit(1734099374.310:1449): pid=5835 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 Dec 13 14:16:14.310000 audit[5835]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc57bc2b0 a2=3 a3=1 items=0 ppid=1 pid=5835 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:14.341858 kernel: audit: type=1300 audit(1734099374.310:1449): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc57bc2b0 a2=3 a3=1 items=0 ppid=1 pid=5835 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:14.310000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:16:14.345898 kernel: audit: type=1327 audit(1734099374.310:1449): proctitle=737368643A20636F7265205B707269765D Dec 13 14:16:14.348929 systemd[1]: Started session-17.scope. Dec 13 14:16:14.349585 systemd-logind[1810]: New session 17 of user core. Dec 13 14:16:14.359000 audit[5835]: USER_START pid=5835 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:14.371000 audit[5837]: CRED_ACQ pid=5837 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:14.380388 kernel: audit: type=1105 audit(1734099374.359:1450): pid=5835 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:14.380557 kernel: audit: type=1103 audit(1734099374.371:1451): pid=5837 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:14.659409 sshd[5835]: pam_unix(sshd:session): session closed for user core Dec 13 14:16:14.662000 audit[5835]: USER_END pid=5835 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:14.674342 systemd[1]: sshd@16-172.31.18.231:22-139.178.89.65:45050.service: Deactivated successfully. Dec 13 14:16:14.675791 systemd[1]: session-17.scope: Deactivated successfully. Dec 13 14:16:14.664000 audit[5835]: CRED_DISP pid=5835 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:14.688466 kernel: audit: type=1106 audit(1734099374.662:1452): pid=5835 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:14.688660 kernel: audit: type=1104 audit(1734099374.664:1453): pid=5835 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:14.674000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-172.31.18.231:22-139.178.89.65:45050 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:14.690745 systemd-logind[1810]: Session 17 logged out. Waiting for processes to exit. Dec 13 14:16:14.693726 systemd-logind[1810]: Removed session 17. Dec 13 14:16:19.696527 systemd[1]: Started sshd@17-172.31.18.231:22-139.178.89.65:53692.service. Dec 13 14:16:19.708220 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 14:16:19.708370 kernel: audit: type=1130 audit(1734099379.696:1455): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-172.31.18.231:22-139.178.89.65:53692 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:19.696000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-172.31.18.231:22-139.178.89.65:53692 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:19.877000 audit[5855]: USER_ACCT pid=5855 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:19.880682 sshd[5855]: Accepted publickey for core from 139.178.89.65 port 53692 ssh2: RSA SHA256:07jB2DPJgjjhgg3L8Uh349EZ0zHZFrUiRWNbK+Fdo0Q Dec 13 14:16:19.888000 audit[5855]: CRED_ACQ pid=5855 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:19.889973 sshd[5855]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:16:19.897817 kernel: audit: type=1101 audit(1734099379.877:1456): pid=5855 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:19.897969 kernel: audit: type=1103 audit(1734099379.888:1457): pid=5855 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:19.903647 kernel: audit: type=1006 audit(1734099379.888:1458): pid=5855 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=18 res=1 Dec 13 14:16:19.888000 audit[5855]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd6a9b510 a2=3 a3=1 items=0 ppid=1 pid=5855 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:19.913899 kernel: audit: type=1300 audit(1734099379.888:1458): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd6a9b510 a2=3 a3=1 items=0 ppid=1 pid=5855 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:19.888000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:16:19.917284 kernel: audit: type=1327 audit(1734099379.888:1458): proctitle=737368643A20636F7265205B707269765D Dec 13 14:16:19.921012 systemd-logind[1810]: New session 18 of user core. Dec 13 14:16:19.922361 systemd[1]: Started session-18.scope. Dec 13 14:16:19.934000 audit[5855]: USER_START pid=5855 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:19.945000 audit[5857]: CRED_ACQ pid=5857 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:19.955829 kernel: audit: type=1105 audit(1734099379.934:1459): pid=5855 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:19.956002 kernel: audit: type=1103 audit(1734099379.945:1460): pid=5857 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:20.241102 sshd[5855]: pam_unix(sshd:session): session closed for user core Dec 13 14:16:20.242000 audit[5855]: USER_END pid=5855 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:20.246087 systemd-logind[1810]: Session 18 logged out. Waiting for processes to exit. Dec 13 14:16:20.248844 systemd[1]: sshd@17-172.31.18.231:22-139.178.89.65:53692.service: Deactivated successfully. Dec 13 14:16:20.250155 systemd[1]: session-18.scope: Deactivated successfully. Dec 13 14:16:20.253018 systemd-logind[1810]: Removed session 18. Dec 13 14:16:20.242000 audit[5855]: CRED_DISP pid=5855 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:20.264176 kernel: audit: type=1106 audit(1734099380.242:1461): pid=5855 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:20.264355 kernel: audit: type=1104 audit(1734099380.242:1462): pid=5855 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:20.244000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-172.31.18.231:22-139.178.89.65:53692 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:20.272783 systemd[1]: Started sshd@18-172.31.18.231:22-139.178.89.65:53702.service. Dec 13 14:16:20.272000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-172.31.18.231:22-139.178.89.65:53702 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:20.445945 sshd[5868]: Accepted publickey for core from 139.178.89.65 port 53702 ssh2: RSA SHA256:07jB2DPJgjjhgg3L8Uh349EZ0zHZFrUiRWNbK+Fdo0Q Dec 13 14:16:20.445000 audit[5868]: USER_ACCT pid=5868 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:20.449331 sshd[5868]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:16:20.448000 audit[5868]: CRED_ACQ pid=5868 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:20.448000 audit[5868]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc773d220 a2=3 a3=1 items=0 ppid=1 pid=5868 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:20.448000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:16:20.458550 systemd-logind[1810]: New session 19 of user core. Dec 13 14:16:20.459409 systemd[1]: Started session-19.scope. Dec 13 14:16:20.469000 audit[5868]: USER_START pid=5868 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:20.471000 audit[5870]: CRED_ACQ pid=5870 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:21.086398 sshd[5868]: pam_unix(sshd:session): session closed for user core Dec 13 14:16:21.094000 audit[5868]: USER_END pid=5868 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:21.095000 audit[5868]: CRED_DISP pid=5868 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:21.097011 systemd[1]: run-containerd-runc-k8s.io-7229709ced1bd250822fb8755b0fa47f6d2169b7dd128fa7731dbdb34347a9f2-runc.RLGQin.mount: Deactivated successfully. Dec 13 14:16:21.102604 systemd[1]: sshd@18-172.31.18.231:22-139.178.89.65:53702.service: Deactivated successfully. Dec 13 14:16:21.104000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-172.31.18.231:22-139.178.89.65:53702 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:21.105881 systemd[1]: session-19.scope: Deactivated successfully. Dec 13 14:16:21.112830 systemd-logind[1810]: Session 19 logged out. Waiting for processes to exit. Dec 13 14:16:21.122000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-172.31.18.231:22-139.178.89.65:53704 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:21.122844 systemd[1]: Started sshd@19-172.31.18.231:22-139.178.89.65:53704.service. Dec 13 14:16:21.130364 systemd-logind[1810]: Removed session 19. Dec 13 14:16:21.316000 audit[5889]: USER_ACCT pid=5889 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:21.316974 sshd[5889]: Accepted publickey for core from 139.178.89.65 port 53704 ssh2: RSA SHA256:07jB2DPJgjjhgg3L8Uh349EZ0zHZFrUiRWNbK+Fdo0Q Dec 13 14:16:21.318000 audit[5889]: CRED_ACQ pid=5889 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:21.318000 audit[5889]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffea781ee0 a2=3 a3=1 items=0 ppid=1 pid=5889 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:21.318000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:16:21.320008 sshd[5889]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:16:21.328551 systemd-logind[1810]: New session 20 of user core. Dec 13 14:16:21.329307 systemd[1]: Started session-20.scope. Dec 13 14:16:21.344000 audit[5889]: USER_START pid=5889 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:21.349000 audit[5899]: CRED_ACQ pid=5899 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:22.383584 systemd[1]: run-containerd-runc-k8s.io-7229709ced1bd250822fb8755b0fa47f6d2169b7dd128fa7731dbdb34347a9f2-runc.wCNOkh.mount: Deactivated successfully. Dec 13 14:16:24.875000 audit[5930]: NETFILTER_CFG table=filter:123 family=2 entries=20 op=nft_register_rule pid=5930 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:16:24.877975 kernel: kauditd_printk_skb: 20 callbacks suppressed Dec 13 14:16:24.878095 kernel: audit: type=1325 audit(1734099384.875:1479): table=filter:123 family=2 entries=20 op=nft_register_rule pid=5930 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:16:24.875000 audit[5930]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11860 a0=3 a1=ffffe0c379c0 a2=0 a3=1 items=0 ppid=3199 pid=5930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:24.900441 kernel: audit: type=1300 audit(1734099384.875:1479): arch=c00000b7 syscall=211 success=yes exit=11860 a0=3 a1=ffffe0c379c0 a2=0 a3=1 items=0 ppid=3199 pid=5930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:24.900612 kernel: audit: type=1327 audit(1734099384.875:1479): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:16:24.875000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:16:24.891000 audit[5930]: NETFILTER_CFG table=nat:124 family=2 entries=22 op=nft_register_rule pid=5930 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:16:24.913174 kernel: audit: type=1325 audit(1734099384.891:1480): table=nat:124 family=2 entries=22 op=nft_register_rule pid=5930 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:16:24.913322 kernel: audit: type=1300 audit(1734099384.891:1480): arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=ffffe0c379c0 a2=0 a3=1 items=0 ppid=3199 pid=5930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:24.891000 audit[5930]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=ffffe0c379c0 a2=0 a3=1 items=0 ppid=3199 pid=5930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:24.914073 sshd[5889]: pam_unix(sshd:session): session closed for user core Dec 13 14:16:24.891000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:16:24.928110 kernel: audit: type=1327 audit(1734099384.891:1480): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:16:24.929000 audit[5889]: USER_END pid=5889 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:24.940961 kernel: audit: type=1106 audit(1734099384.929:1481): pid=5889 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:24.929000 audit[5889]: CRED_DISP pid=5889 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:24.947660 systemd[1]: sshd@19-172.31.18.231:22-139.178.89.65:53704.service: Deactivated successfully. Dec 13 14:16:24.948990 systemd[1]: session-20.scope: Deactivated successfully. Dec 13 14:16:24.950717 kernel: audit: type=1104 audit(1734099384.929:1482): pid=5889 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:24.949258 systemd[1]: session-20.scope: Consumed 1.007s CPU time. Dec 13 14:16:24.947000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-172.31.18.231:22-139.178.89.65:53704 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:24.953645 systemd-logind[1810]: Session 20 logged out. Waiting for processes to exit. Dec 13 14:16:24.959514 kernel: audit: type=1131 audit(1734099384.947:1483): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-172.31.18.231:22-139.178.89.65:53704 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:24.965000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-172.31.18.231:22-139.178.89.65:53710 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:24.965914 systemd[1]: Started sshd@20-172.31.18.231:22-139.178.89.65:53710.service. Dec 13 14:16:24.971805 systemd-logind[1810]: Removed session 20. Dec 13 14:16:24.982500 kernel: audit: type=1130 audit(1734099384.965:1484): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-172.31.18.231:22-139.178.89.65:53710 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:25.010000 audit[5936]: NETFILTER_CFG table=filter:125 family=2 entries=32 op=nft_register_rule pid=5936 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:16:25.010000 audit[5936]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11860 a0=3 a1=ffffc253b7e0 a2=0 a3=1 items=0 ppid=3199 pid=5936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:25.010000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:16:25.017000 audit[5936]: NETFILTER_CFG table=nat:126 family=2 entries=22 op=nft_register_rule pid=5936 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:16:25.017000 audit[5936]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=ffffc253b7e0 a2=0 a3=1 items=0 ppid=3199 pid=5936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:25.017000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:16:25.143000 audit[5934]: USER_ACCT pid=5934 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:25.145022 sshd[5934]: Accepted publickey for core from 139.178.89.65 port 53710 ssh2: RSA SHA256:07jB2DPJgjjhgg3L8Uh349EZ0zHZFrUiRWNbK+Fdo0Q Dec 13 14:16:25.146000 audit[5934]: CRED_ACQ pid=5934 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:25.146000 audit[5934]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc2713f90 a2=3 a3=1 items=0 ppid=1 pid=5934 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:25.146000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:16:25.147821 sshd[5934]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:16:25.156561 systemd-logind[1810]: New session 21 of user core. Dec 13 14:16:25.158282 systemd[1]: Started session-21.scope. Dec 13 14:16:25.168000 audit[5934]: USER_START pid=5934 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:25.170000 audit[5937]: CRED_ACQ pid=5937 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:25.690956 sshd[5934]: pam_unix(sshd:session): session closed for user core Dec 13 14:16:25.692000 audit[5934]: USER_END pid=5934 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:25.692000 audit[5934]: CRED_DISP pid=5934 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:25.696180 systemd[1]: sshd@20-172.31.18.231:22-139.178.89.65:53710.service: Deactivated successfully. Dec 13 14:16:25.696000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-172.31.18.231:22-139.178.89.65:53710 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:25.698020 systemd[1]: session-21.scope: Deactivated successfully. Dec 13 14:16:25.699572 systemd-logind[1810]: Session 21 logged out. Waiting for processes to exit. Dec 13 14:16:25.701857 systemd-logind[1810]: Removed session 21. Dec 13 14:16:25.722221 systemd[1]: Started sshd@21-172.31.18.231:22-139.178.89.65:53722.service. Dec 13 14:16:25.722000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-172.31.18.231:22-139.178.89.65:53722 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:25.895000 audit[5944]: USER_ACCT pid=5944 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:25.896363 sshd[5944]: Accepted publickey for core from 139.178.89.65 port 53722 ssh2: RSA SHA256:07jB2DPJgjjhgg3L8Uh349EZ0zHZFrUiRWNbK+Fdo0Q Dec 13 14:16:25.897000 audit[5944]: CRED_ACQ pid=5944 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:25.898000 audit[5944]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffffcd6210 a2=3 a3=1 items=0 ppid=1 pid=5944 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:25.898000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:16:25.899206 sshd[5944]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:16:25.912716 systemd-logind[1810]: New session 22 of user core. Dec 13 14:16:25.913155 systemd[1]: Started session-22.scope. Dec 13 14:16:25.924000 audit[5944]: USER_START pid=5944 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:25.927000 audit[5946]: CRED_ACQ pid=5946 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:26.172305 sshd[5944]: pam_unix(sshd:session): session closed for user core Dec 13 14:16:26.174000 audit[5944]: USER_END pid=5944 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:26.174000 audit[5944]: CRED_DISP pid=5944 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:26.177869 systemd-logind[1810]: Session 22 logged out. Waiting for processes to exit. Dec 13 14:16:26.178510 systemd[1]: sshd@21-172.31.18.231:22-139.178.89.65:53722.service: Deactivated successfully. Dec 13 14:16:26.178000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-172.31.18.231:22-139.178.89.65:53722 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:26.179985 systemd[1]: session-22.scope: Deactivated successfully. Dec 13 14:16:26.182512 systemd-logind[1810]: Removed session 22. Dec 13 14:16:31.213176 kernel: kauditd_printk_skb: 27 callbacks suppressed Dec 13 14:16:31.213327 kernel: audit: type=1130 audit(1734099391.202:1504): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-172.31.18.231:22-139.178.89.65:34454 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:31.202000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-172.31.18.231:22-139.178.89.65:34454 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:31.202732 systemd[1]: Started sshd@22-172.31.18.231:22-139.178.89.65:34454.service. Dec 13 14:16:31.370000 audit[5979]: USER_ACCT pid=5979 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:31.371472 sshd[5979]: Accepted publickey for core from 139.178.89.65 port 34454 ssh2: RSA SHA256:07jB2DPJgjjhgg3L8Uh349EZ0zHZFrUiRWNbK+Fdo0Q Dec 13 14:16:31.381463 kernel: audit: type=1101 audit(1734099391.370:1505): pid=5979 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:31.382000 audit[5979]: CRED_ACQ pid=5979 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:31.383883 sshd[5979]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:16:31.394467 kernel: audit: type=1103 audit(1734099391.382:1506): pid=5979 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:31.394569 kernel: audit: type=1006 audit(1734099391.382:1507): pid=5979 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 Dec 13 14:16:31.382000 audit[5979]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffcc206330 a2=3 a3=1 items=0 ppid=1 pid=5979 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:31.407872 kernel: audit: type=1300 audit(1734099391.382:1507): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffcc206330 a2=3 a3=1 items=0 ppid=1 pid=5979 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:31.382000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:16:31.411383 kernel: audit: type=1327 audit(1734099391.382:1507): proctitle=737368643A20636F7265205B707269765D Dec 13 14:16:31.414084 systemd-logind[1810]: New session 23 of user core. Dec 13 14:16:31.415913 systemd[1]: Started session-23.scope. Dec 13 14:16:31.426000 audit[5979]: USER_START pid=5979 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:31.438631 kernel: audit: type=1105 audit(1734099391.426:1508): pid=5979 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:31.438000 audit[5981]: CRED_ACQ pid=5981 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:31.448543 kernel: audit: type=1103 audit(1734099391.438:1509): pid=5981 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:31.681643 sshd[5979]: pam_unix(sshd:session): session closed for user core Dec 13 14:16:31.683000 audit[5979]: USER_END pid=5979 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:31.691897 systemd[1]: session-23.scope: Deactivated successfully. Dec 13 14:16:31.693166 systemd[1]: sshd@22-172.31.18.231:22-139.178.89.65:34454.service: Deactivated successfully. Dec 13 14:16:31.689000 audit[5979]: CRED_DISP pid=5979 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:31.703797 kernel: audit: type=1106 audit(1734099391.683:1510): pid=5979 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:31.703873 kernel: audit: type=1104 audit(1734099391.689:1511): pid=5979 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:31.689000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-172.31.18.231:22-139.178.89.65:34454 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:31.704835 systemd-logind[1810]: Session 23 logged out. Waiting for processes to exit. Dec 13 14:16:31.706522 systemd-logind[1810]: Removed session 23. Dec 13 14:16:34.245000 audit[5991]: NETFILTER_CFG table=filter:127 family=2 entries=20 op=nft_register_rule pid=5991 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:16:34.245000 audit[5991]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffd8f685c0 a2=0 a3=1 items=0 ppid=3199 pid=5991 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:34.245000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:16:34.256000 audit[5991]: NETFILTER_CFG table=nat:128 family=2 entries=106 op=nft_register_chain pid=5991 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:16:34.256000 audit[5991]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=49452 a0=3 a1=ffffd8f685c0 a2=0 a3=1 items=0 ppid=3199 pid=5991 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:34.256000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:16:36.495000 audit[2664]: AVC avc: denied { watch } for pid=2664 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=8277 scontext=system_u:system_r:svirt_lxc_net_t:s0:c127,c295 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:16:36.497579 kernel: kauditd_printk_skb: 7 callbacks suppressed Dec 13 14:16:36.497680 kernel: audit: type=1400 audit(1734099396.495:1515): avc: denied { watch } for pid=2664 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=8277 scontext=system_u:system_r:svirt_lxc_net_t:s0:c127,c295 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:16:36.495000 audit[2664]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000dffb00 a2=fc6 a3=0 items=0 ppid=2518 pid=2664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c127,c295 key=(null) Dec 13 14:16:36.518231 kernel: audit: type=1300 audit(1734099396.495:1515): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000dffb00 a2=fc6 a3=0 items=0 ppid=2518 pid=2664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c127,c295 key=(null) Dec 13 14:16:36.495000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:16:36.527888 kernel: audit: type=1327 audit(1734099396.495:1515): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:16:36.495000 audit[2664]: AVC avc: denied { watch } for pid=2664 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=8270 scontext=system_u:system_r:svirt_lxc_net_t:s0:c127,c295 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:16:36.536535 kernel: audit: type=1400 audit(1734099396.495:1516): avc: denied { watch } for pid=2664 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=8270 scontext=system_u:system_r:svirt_lxc_net_t:s0:c127,c295 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:16:36.495000 audit[2664]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000eee220 a2=fc6 a3=0 items=0 ppid=2518 pid=2664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c127,c295 key=(null) Dec 13 14:16:36.547832 kernel: audit: type=1300 audit(1734099396.495:1516): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000eee220 a2=fc6 a3=0 items=0 ppid=2518 pid=2664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c127,c295 key=(null) Dec 13 14:16:36.495000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:16:36.557376 kernel: audit: type=1327 audit(1734099396.495:1516): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:16:36.712908 systemd[1]: Started sshd@23-172.31.18.231:22-139.178.89.65:34462.service. Dec 13 14:16:36.713000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-172.31.18.231:22-139.178.89.65:34462 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:36.723463 kernel: audit: type=1130 audit(1734099396.713:1517): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-172.31.18.231:22-139.178.89.65:34462 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:36.884000 audit[5994]: USER_ACCT pid=5994 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:36.885651 sshd[5994]: Accepted publickey for core from 139.178.89.65 port 34462 ssh2: RSA SHA256:07jB2DPJgjjhgg3L8Uh349EZ0zHZFrUiRWNbK+Fdo0Q Dec 13 14:16:36.896505 kernel: audit: type=1101 audit(1734099396.884:1518): pid=5994 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:36.897512 sshd[5994]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:16:36.896000 audit[5994]: CRED_ACQ pid=5994 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:36.913246 kernel: audit: type=1103 audit(1734099396.896:1519): pid=5994 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:36.913395 kernel: audit: type=1006 audit(1734099396.896:1520): pid=5994 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 Dec 13 14:16:36.896000 audit[5994]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffef17d4f0 a2=3 a3=1 items=0 ppid=1 pid=5994 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:36.896000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:16:36.920388 systemd-logind[1810]: New session 24 of user core. Dec 13 14:16:36.923745 systemd[1]: Started session-24.scope. Dec 13 14:16:36.932000 audit[5994]: USER_START pid=5994 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:36.935000 audit[5996]: CRED_ACQ pid=5996 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:37.173279 sshd[5994]: pam_unix(sshd:session): session closed for user core Dec 13 14:16:37.175000 audit[5994]: USER_END pid=5994 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:37.176000 audit[5994]: CRED_DISP pid=5994 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:37.179154 systemd[1]: session-24.scope: Deactivated successfully. Dec 13 14:16:37.180979 systemd-logind[1810]: Session 24 logged out. Waiting for processes to exit. Dec 13 14:16:37.181261 systemd[1]: sshd@23-172.31.18.231:22-139.178.89.65:34462.service: Deactivated successfully. Dec 13 14:16:37.181000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-172.31.18.231:22-139.178.89.65:34462 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:37.186282 systemd-logind[1810]: Removed session 24. Dec 13 14:16:37.667000 audit[2638]: AVC avc: denied { watch } for pid=2638 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=8277 scontext=system_u:system_r:svirt_lxc_net_t:s0:c190,c319 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:16:37.667000 audit[2638]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=77 a1=4011efb260 a2=fc6 a3=0 items=0 ppid=2488 pid=2638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c190,c319 key=(null) Dec 13 14:16:37.667000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31382E323331002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:16:37.667000 audit[2638]: AVC avc: denied { watch } for pid=2638 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=8270 scontext=system_u:system_r:svirt_lxc_net_t:s0:c190,c319 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:16:37.667000 audit[2638]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=77 a1=400dbe1140 a2=fc6 a3=0 items=0 ppid=2488 pid=2638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c190,c319 key=(null) Dec 13 14:16:37.667000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31382E323331002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:16:37.668000 audit[2638]: AVC avc: denied { watch } for pid=2638 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=8272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c190,c319 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:16:37.668000 audit[2638]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=77 a1=4009fc2600 a2=fc6 a3=0 items=0 ppid=2488 pid=2638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c190,c319 key=(null) Dec 13 14:16:37.668000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31382E323331002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:16:37.687000 audit[2638]: AVC avc: denied { watch } for pid=2638 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=8279 scontext=system_u:system_r:svirt_lxc_net_t:s0:c190,c319 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:16:37.687000 audit[2638]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=77 a1=4009fc2750 a2=fc6 a3=0 items=0 ppid=2488 pid=2638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c190,c319 key=(null) Dec 13 14:16:37.687000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31382E323331002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:16:37.692000 audit[2638]: AVC avc: denied { watch } for pid=2638 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=8277 scontext=system_u:system_r:svirt_lxc_net_t:s0:c190,c319 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:16:37.692000 audit[2638]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=77 a1=4011efb2f0 a2=fc6 a3=0 items=0 ppid=2488 pid=2638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c190,c319 key=(null) Dec 13 14:16:37.692000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31382E323331002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:16:37.693000 audit[2638]: AVC avc: denied { watch } for pid=2638 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=8270 scontext=system_u:system_r:svirt_lxc_net_t:s0:c190,c319 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:16:37.693000 audit[2638]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=78 a1=400dbe1460 a2=fc6 a3=0 items=0 ppid=2488 pid=2638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c190,c319 key=(null) Dec 13 14:16:37.693000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31382E323331002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:16:42.201513 systemd[1]: Started sshd@24-172.31.18.231:22-139.178.89.65:57368.service. Dec 13 14:16:42.212046 kernel: kauditd_printk_skb: 25 callbacks suppressed Dec 13 14:16:42.212132 kernel: audit: type=1130 audit(1734099402.200:1532): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-172.31.18.231:22-139.178.89.65:57368 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:42.200000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-172.31.18.231:22-139.178.89.65:57368 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:42.368000 audit[6008]: USER_ACCT pid=6008 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:42.370340 sshd[6008]: Accepted publickey for core from 139.178.89.65 port 57368 ssh2: RSA SHA256:07jB2DPJgjjhgg3L8Uh349EZ0zHZFrUiRWNbK+Fdo0Q Dec 13 14:16:42.381494 kernel: audit: type=1101 audit(1734099402.368:1533): pid=6008 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:42.382961 sshd[6008]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:16:42.380000 audit[6008]: CRED_ACQ pid=6008 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:42.398296 kernel: audit: type=1103 audit(1734099402.380:1534): pid=6008 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:42.398396 kernel: audit: type=1006 audit(1734099402.380:1535): pid=6008 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 Dec 13 14:16:42.380000 audit[6008]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdd821490 a2=3 a3=1 items=0 ppid=1 pid=6008 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:42.410299 kernel: audit: type=1300 audit(1734099402.380:1535): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdd821490 a2=3 a3=1 items=0 ppid=1 pid=6008 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:42.380000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:16:42.414067 kernel: audit: type=1327 audit(1734099402.380:1535): proctitle=737368643A20636F7265205B707269765D Dec 13 14:16:42.415777 systemd-logind[1810]: New session 25 of user core. Dec 13 14:16:42.416817 systemd[1]: Started session-25.scope. Dec 13 14:16:42.428000 audit[6008]: USER_START pid=6008 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:42.432000 audit[6011]: CRED_ACQ pid=6011 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:42.449818 kernel: audit: type=1105 audit(1734099402.428:1536): pid=6008 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:42.449971 kernel: audit: type=1103 audit(1734099402.432:1537): pid=6011 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:42.682604 sshd[6008]: pam_unix(sshd:session): session closed for user core Dec 13 14:16:42.682000 audit[6008]: USER_END pid=6008 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:42.687832 systemd[1]: session-25.scope: Deactivated successfully. Dec 13 14:16:42.689332 systemd[1]: sshd@24-172.31.18.231:22-139.178.89.65:57368.service: Deactivated successfully. Dec 13 14:16:42.684000 audit[6008]: CRED_DISP pid=6008 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:42.704387 kernel: audit: type=1106 audit(1734099402.682:1538): pid=6008 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:42.704543 kernel: audit: type=1104 audit(1734099402.684:1539): pid=6008 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:42.688000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-172.31.18.231:22-139.178.89.65:57368 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:42.704956 systemd-logind[1810]: Session 25 logged out. Waiting for processes to exit. Dec 13 14:16:42.706712 systemd-logind[1810]: Removed session 25. Dec 13 14:16:43.117000 audit[5168]: AVC avc: denied { watch } for pid=5168 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_14_15_21.439382433/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c681,c915 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c681,c915 tclass=file permissive=0 Dec 13 14:16:43.117000 audit[5168]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=400190a360 a2=fc6 a3=0 items=0 ppid=4411 pid=5168 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c681,c915 key=(null) Dec 13 14:16:43.117000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 14:16:47.713000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-172.31.18.231:22-139.178.89.65:57380 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:47.714958 systemd[1]: Started sshd@25-172.31.18.231:22-139.178.89.65:57380.service. Dec 13 14:16:47.718905 kernel: kauditd_printk_skb: 4 callbacks suppressed Dec 13 14:16:47.719062 kernel: audit: type=1130 audit(1734099407.713:1542): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-172.31.18.231:22-139.178.89.65:57380 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:47.884000 audit[6021]: USER_ACCT pid=6021 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:47.888762 sshd[6021]: Accepted publickey for core from 139.178.89.65 port 57380 ssh2: RSA SHA256:07jB2DPJgjjhgg3L8Uh349EZ0zHZFrUiRWNbK+Fdo0Q Dec 13 14:16:47.891993 sshd[6021]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:16:47.889000 audit[6021]: CRED_ACQ pid=6021 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:47.905022 kernel: audit: type=1101 audit(1734099407.884:1543): pid=6021 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:47.905127 kernel: audit: type=1103 audit(1734099407.889:1544): pid=6021 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:47.904222 systemd[1]: Started session-26.scope. Dec 13 14:16:47.907465 systemd-logind[1810]: New session 26 of user core. Dec 13 14:16:47.910794 kernel: audit: type=1006 audit(1734099407.889:1545): pid=6021 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 Dec 13 14:16:47.889000 audit[6021]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdc0a8e10 a2=3 a3=1 items=0 ppid=1 pid=6021 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:47.921060 kernel: audit: type=1300 audit(1734099407.889:1545): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdc0a8e10 a2=3 a3=1 items=0 ppid=1 pid=6021 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:47.889000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:16:47.925630 kernel: audit: type=1327 audit(1734099407.889:1545): proctitle=737368643A20636F7265205B707269765D Dec 13 14:16:47.925751 kernel: audit: type=1105 audit(1734099407.920:1546): pid=6021 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:47.920000 audit[6021]: USER_START pid=6021 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:47.924000 audit[6023]: CRED_ACQ pid=6023 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:47.944468 kernel: audit: type=1103 audit(1734099407.924:1547): pid=6023 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:48.169617 sshd[6021]: pam_unix(sshd:session): session closed for user core Dec 13 14:16:48.170000 audit[6021]: USER_END pid=6021 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:48.175178 systemd-logind[1810]: Session 26 logged out. Waiting for processes to exit. Dec 13 14:16:48.177373 systemd[1]: session-26.scope: Deactivated successfully. Dec 13 14:16:48.179336 systemd-logind[1810]: Removed session 26. Dec 13 14:16:48.180763 systemd[1]: sshd@25-172.31.18.231:22-139.178.89.65:57380.service: Deactivated successfully. Dec 13 14:16:48.170000 audit[6021]: CRED_DISP pid=6021 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:48.183476 kernel: audit: type=1106 audit(1734099408.170:1548): pid=6021 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:48.179000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-172.31.18.231:22-139.178.89.65:57380 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:48.192456 kernel: audit: type=1104 audit(1734099408.170:1549): pid=6021 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:51.085000 audit[5618]: AVC avc: denied { watch } for pid=5618 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_14_15_20.1259537782/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c163,c497 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c163,c497 tclass=file permissive=0 Dec 13 14:16:51.085000 audit[5618]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=40017e4140 a2=fc6 a3=0 items=0 ppid=5009 pid=5618 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c163,c497 key=(null) Dec 13 14:16:51.085000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 14:16:53.209450 kernel: kauditd_printk_skb: 4 callbacks suppressed Dec 13 14:16:53.209573 kernel: audit: type=1130 audit(1734099413.197:1552): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-172.31.18.231:22-139.178.89.65:55358 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:53.197000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-172.31.18.231:22-139.178.89.65:55358 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:53.199047 systemd[1]: Started sshd@26-172.31.18.231:22-139.178.89.65:55358.service. Dec 13 14:16:53.365000 audit[6050]: USER_ACCT pid=6050 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:53.369838 sshd[6050]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:16:53.372011 sshd[6050]: Accepted publickey for core from 139.178.89.65 port 55358 ssh2: RSA SHA256:07jB2DPJgjjhgg3L8Uh349EZ0zHZFrUiRWNbK+Fdo0Q Dec 13 14:16:53.367000 audit[6050]: CRED_ACQ pid=6050 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:53.385882 kernel: audit: type=1101 audit(1734099413.365:1553): pid=6050 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:53.385976 kernel: audit: type=1103 audit(1734099413.367:1554): pid=6050 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:53.392094 kernel: audit: type=1006 audit(1734099413.367:1555): pid=6050 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=27 res=1 Dec 13 14:16:53.367000 audit[6050]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffeb3c2690 a2=3 a3=1 items=0 ppid=1 pid=6050 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:53.392548 kernel: audit: type=1300 audit(1734099413.367:1555): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffeb3c2690 a2=3 a3=1 items=0 ppid=1 pid=6050 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:53.367000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:16:53.405537 kernel: audit: type=1327 audit(1734099413.367:1555): proctitle=737368643A20636F7265205B707269765D Dec 13 14:16:53.409541 systemd-logind[1810]: New session 27 of user core. Dec 13 14:16:53.410473 systemd[1]: Started session-27.scope. Dec 13 14:16:53.418000 audit[6050]: USER_START pid=6050 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:53.421000 audit[6052]: CRED_ACQ pid=6052 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:53.439526 kernel: audit: type=1105 audit(1734099413.418:1556): pid=6050 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:53.439617 kernel: audit: type=1103 audit(1734099413.421:1557): pid=6052 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:53.633000 audit[2664]: AVC avc: denied { watch } for pid=2664 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=8270 scontext=system_u:system_r:svirt_lxc_net_t:s0:c127,c295 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:16:53.633000 audit[2664]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000eef8c0 a2=fc6 a3=0 items=0 ppid=2518 pid=2664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c127,c295 key=(null) Dec 13 14:16:53.661224 kernel: audit: type=1400 audit(1734099413.633:1558): avc: denied { watch } for pid=2664 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=8270 scontext=system_u:system_r:svirt_lxc_net_t:s0:c127,c295 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:16:53.661352 kernel: audit: type=1300 audit(1734099413.633:1558): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000eef8c0 a2=fc6 a3=0 items=0 ppid=2518 pid=2664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c127,c295 key=(null) Dec 13 14:16:53.633000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:16:53.636000 audit[2664]: AVC avc: denied { watch } for pid=2664 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=8270 scontext=system_u:system_r:svirt_lxc_net_t:s0:c127,c295 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:16:53.636000 audit[2664]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000eefa60 a2=fc6 a3=0 items=0 ppid=2518 pid=2664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c127,c295 key=(null) Dec 13 14:16:53.636000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:16:53.636000 audit[2664]: AVC avc: denied { watch } for pid=2664 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=8270 scontext=system_u:system_r:svirt_lxc_net_t:s0:c127,c295 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:16:53.636000 audit[2664]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000eefa80 a2=fc6 a3=0 items=0 ppid=2518 pid=2664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c127,c295 key=(null) Dec 13 14:16:53.636000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:16:53.637000 audit[2664]: AVC avc: denied { watch } for pid=2664 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=8270 scontext=system_u:system_r:svirt_lxc_net_t:s0:c127,c295 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:16:53.637000 audit[2664]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000eefda0 a2=fc6 a3=0 items=0 ppid=2518 pid=2664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c127,c295 key=(null) Dec 13 14:16:53.637000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:16:53.696178 sshd[6050]: pam_unix(sshd:session): session closed for user core Dec 13 14:16:53.696000 audit[6050]: USER_END pid=6050 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:53.696000 audit[6050]: CRED_DISP pid=6050 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:53.700000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-172.31.18.231:22-139.178.89.65:55358 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:53.700199 systemd[1]: session-27.scope: Deactivated successfully. Dec 13 14:16:53.701502 systemd-logind[1810]: Session 27 logged out. Waiting for processes to exit. Dec 13 14:16:53.701786 systemd[1]: sshd@26-172.31.18.231:22-139.178.89.65:55358.service: Deactivated successfully. Dec 13 14:16:53.704039 systemd-logind[1810]: Removed session 27. Dec 13 14:16:58.724514 systemd[1]: Started sshd@27-172.31.18.231:22-139.178.89.65:42820.service. Dec 13 14:16:58.723000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-172.31.18.231:22-139.178.89.65:42820 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:58.729542 kernel: kauditd_printk_skb: 13 callbacks suppressed Dec 13 14:16:58.729698 kernel: audit: type=1130 audit(1734099418.723:1565): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-172.31.18.231:22-139.178.89.65:42820 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:58.897000 audit[6070]: USER_ACCT pid=6070 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:58.899046 sshd[6070]: Accepted publickey for core from 139.178.89.65 port 42820 ssh2: RSA SHA256:07jB2DPJgjjhgg3L8Uh349EZ0zHZFrUiRWNbK+Fdo0Q Dec 13 14:16:58.909473 kernel: audit: type=1101 audit(1734099418.897:1566): pid=6070 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:58.908000 audit[6070]: CRED_ACQ pid=6070 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:58.911534 sshd[6070]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:16:58.925058 kernel: audit: type=1103 audit(1734099418.908:1567): pid=6070 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:58.925249 kernel: audit: type=1006 audit(1734099418.909:1568): pid=6070 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=28 res=1 Dec 13 14:16:58.909000 audit[6070]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff1e25a80 a2=3 a3=1 items=0 ppid=1 pid=6070 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:58.935338 kernel: audit: type=1300 audit(1734099418.909:1568): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff1e25a80 a2=3 a3=1 items=0 ppid=1 pid=6070 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:16:58.941538 kernel: audit: type=1327 audit(1734099418.909:1568): proctitle=737368643A20636F7265205B707269765D Dec 13 14:16:58.909000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:16:58.948654 systemd-logind[1810]: New session 28 of user core. Dec 13 14:16:58.948821 systemd[1]: Started session-28.scope. Dec 13 14:16:58.957000 audit[6070]: USER_START pid=6070 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:58.958000 audit[6076]: CRED_ACQ pid=6076 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:58.979528 kernel: audit: type=1105 audit(1734099418.957:1569): pid=6070 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:58.979665 kernel: audit: type=1103 audit(1734099418.958:1570): pid=6076 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:59.199964 sshd[6070]: pam_unix(sshd:session): session closed for user core Dec 13 14:16:59.201000 audit[6070]: USER_END pid=6070 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:59.214100 systemd[1]: sshd@27-172.31.18.231:22-139.178.89.65:42820.service: Deactivated successfully. Dec 13 14:16:59.201000 audit[6070]: CRED_DISP pid=6070 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:59.214625 kernel: audit: type=1106 audit(1734099419.201:1571): pid=6070 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:59.215751 systemd[1]: session-28.scope: Deactivated successfully. Dec 13 14:16:59.213000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-172.31.18.231:22-139.178.89.65:42820 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:16:59.224468 kernel: audit: type=1104 audit(1734099419.201:1572): pid=6070 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:16:59.224584 systemd-logind[1810]: Session 28 logged out. Waiting for processes to exit. Dec 13 14:16:59.226184 systemd-logind[1810]: Removed session 28. Dec 13 14:16:59.552699 systemd[1]: run-containerd-runc-k8s.io-1e8797ae33a4253a5d34ec17f2b3fb7160c980bfe3c8132ebd8ccf9ce8e52006-runc.mczlJf.mount: Deactivated successfully. Dec 13 14:17:04.229129 systemd[1]: Started sshd@28-172.31.18.231:22-139.178.89.65:42834.service. Dec 13 14:17:04.228000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-172.31.18.231:22-139.178.89.65:42834 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:04.232097 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 14:17:04.232249 kernel: audit: type=1130 audit(1734099424.228:1574): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-172.31.18.231:22-139.178.89.65:42834 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:04.407000 audit[6108]: USER_ACCT pid=6108 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:04.419623 kernel: audit: type=1101 audit(1734099424.407:1575): pid=6108 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:04.421586 sshd[6108]: Accepted publickey for core from 139.178.89.65 port 42834 ssh2: RSA SHA256:07jB2DPJgjjhgg3L8Uh349EZ0zHZFrUiRWNbK+Fdo0Q Dec 13 14:17:04.420000 audit[6108]: CRED_ACQ pid=6108 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:04.423035 sshd[6108]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:17:04.437308 kernel: audit: type=1103 audit(1734099424.420:1576): pid=6108 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:04.437502 kernel: audit: type=1006 audit(1734099424.420:1577): pid=6108 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=29 res=1 Dec 13 14:17:04.437561 kernel: audit: type=1300 audit(1734099424.420:1577): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe0159680 a2=3 a3=1 items=0 ppid=1 pid=6108 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=29 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:04.420000 audit[6108]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe0159680 a2=3 a3=1 items=0 ppid=1 pid=6108 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=29 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:04.440318 systemd[1]: Started session-29.scope. Dec 13 14:17:04.442474 systemd-logind[1810]: New session 29 of user core. Dec 13 14:17:04.420000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:17:04.451983 kernel: audit: type=1327 audit(1734099424.420:1577): proctitle=737368643A20636F7265205B707269765D Dec 13 14:17:04.454000 audit[6108]: USER_START pid=6108 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:04.466556 kernel: audit: type=1105 audit(1734099424.454:1578): pid=6108 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:04.465000 audit[6110]: CRED_ACQ pid=6110 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:04.476468 kernel: audit: type=1103 audit(1734099424.465:1579): pid=6110 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:04.708832 sshd[6108]: pam_unix(sshd:session): session closed for user core Dec 13 14:17:04.709000 audit[6108]: USER_END pid=6108 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:04.710000 audit[6108]: CRED_DISP pid=6108 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:04.722708 systemd[1]: sshd@28-172.31.18.231:22-139.178.89.65:42834.service: Deactivated successfully. Dec 13 14:17:04.723968 systemd[1]: session-29.scope: Deactivated successfully. Dec 13 14:17:04.730550 kernel: audit: type=1106 audit(1734099424.709:1580): pid=6108 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:04.730700 kernel: audit: type=1104 audit(1734099424.710:1581): pid=6108 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Dec 13 14:17:04.721000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-172.31.18.231:22-139.178.89.65:42834 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:17:04.731833 systemd-logind[1810]: Session 29 logged out. Waiting for processes to exit. Dec 13 14:17:04.733656 systemd-logind[1810]: Removed session 29. Dec 13 14:17:18.123538 systemd[1]: cri-containerd-af14b09f5f1d6152c27f0b83af7744b180ba56c926bf9509e0332a9c4edf8e6c.scope: Deactivated successfully. Dec 13 14:17:18.124141 systemd[1]: cri-containerd-af14b09f5f1d6152c27f0b83af7744b180ba56c926bf9509e0332a9c4edf8e6c.scope: Consumed 7.118s CPU time. Dec 13 14:17:18.122000 audit: BPF prog-id=120 op=UNLOAD Dec 13 14:17:18.126704 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 14:17:18.126769 kernel: audit: type=1334 audit(1734099438.122:1583): prog-id=120 op=UNLOAD Dec 13 14:17:18.132269 kernel: audit: type=1334 audit(1734099438.129:1584): prog-id=123 op=UNLOAD Dec 13 14:17:18.129000 audit: BPF prog-id=123 op=UNLOAD Dec 13 14:17:18.172140 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-af14b09f5f1d6152c27f0b83af7744b180ba56c926bf9509e0332a9c4edf8e6c-rootfs.mount: Deactivated successfully. Dec 13 14:17:18.173610 env[1818]: time="2024-12-13T14:17:18.172087430Z" level=info msg="shim disconnected" id=af14b09f5f1d6152c27f0b83af7744b180ba56c926bf9509e0332a9c4edf8e6c Dec 13 14:17:18.173610 env[1818]: time="2024-12-13T14:17:18.172163043Z" level=warning msg="cleaning up after shim disconnected" id=af14b09f5f1d6152c27f0b83af7744b180ba56c926bf9509e0332a9c4edf8e6c namespace=k8s.io Dec 13 14:17:18.173610 env[1818]: time="2024-12-13T14:17:18.172190223Z" level=info msg="cleaning up dead shim" Dec 13 14:17:18.189222 env[1818]: time="2024-12-13T14:17:18.189134718Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:17:18Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=6149 runtime=io.containerd.runc.v2\n" Dec 13 14:17:18.383872 systemd[1]: cri-containerd-ad2ad78420188ee8fa948e31c84f01a15333494e9a3b1df56668606e71b847fd.scope: Deactivated successfully. Dec 13 14:17:18.384518 systemd[1]: cri-containerd-ad2ad78420188ee8fa948e31c84f01a15333494e9a3b1df56668606e71b847fd.scope: Consumed 5.115s CPU time. Dec 13 14:17:18.386000 audit: BPF prog-id=87 op=UNLOAD Dec 13 14:17:18.386000 audit: BPF prog-id=104 op=UNLOAD Dec 13 14:17:18.394141 kernel: audit: type=1334 audit(1734099438.386:1585): prog-id=87 op=UNLOAD Dec 13 14:17:18.394392 kernel: audit: type=1334 audit(1734099438.386:1586): prog-id=104 op=UNLOAD Dec 13 14:17:18.435919 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-ad2ad78420188ee8fa948e31c84f01a15333494e9a3b1df56668606e71b847fd-rootfs.mount: Deactivated successfully. Dec 13 14:17:18.439677 env[1818]: time="2024-12-13T14:17:18.439566520Z" level=info msg="shim disconnected" id=ad2ad78420188ee8fa948e31c84f01a15333494e9a3b1df56668606e71b847fd Dec 13 14:17:18.439677 env[1818]: time="2024-12-13T14:17:18.439644029Z" level=warning msg="cleaning up after shim disconnected" id=ad2ad78420188ee8fa948e31c84f01a15333494e9a3b1df56668606e71b847fd namespace=k8s.io Dec 13 14:17:18.439677 env[1818]: time="2024-12-13T14:17:18.439666169Z" level=info msg="cleaning up dead shim" Dec 13 14:17:18.453548 env[1818]: time="2024-12-13T14:17:18.453438122Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:17:18Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=6174 runtime=io.containerd.runc.v2\n" Dec 13 14:17:19.136398 kubelet[3066]: I1213 14:17:19.136357 3066 scope.go:117] "RemoveContainer" containerID="af14b09f5f1d6152c27f0b83af7744b180ba56c926bf9509e0332a9c4edf8e6c" Dec 13 14:17:19.141092 env[1818]: time="2024-12-13T14:17:19.141036951Z" level=info msg="CreateContainer within sandbox \"0fb26575dbe041e74112d9b1c0088ad109e3c651669cbeffae97ee76d36bc8ec\" for container &ContainerMetadata{Name:tigera-operator,Attempt:1,}" Dec 13 14:17:19.143545 kubelet[3066]: I1213 14:17:19.143488 3066 scope.go:117] "RemoveContainer" containerID="ad2ad78420188ee8fa948e31c84f01a15333494e9a3b1df56668606e71b847fd" Dec 13 14:17:19.150799 env[1818]: time="2024-12-13T14:17:19.150736702Z" level=info msg="CreateContainer within sandbox \"1c7ff81d36972557022972248d6026d3078b1dc2ebbf8b371f6dff12a3f16cf2\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:1,}" Dec 13 14:17:19.178580 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount585039340.mount: Deactivated successfully. Dec 13 14:17:19.190827 env[1818]: time="2024-12-13T14:17:19.190760053Z" level=info msg="CreateContainer within sandbox \"0fb26575dbe041e74112d9b1c0088ad109e3c651669cbeffae97ee76d36bc8ec\" for &ContainerMetadata{Name:tigera-operator,Attempt:1,} returns container id \"20780b84657de7d4af75e131cfb76ddb378620b39ee35a8c8011636d9856a607\"" Dec 13 14:17:19.192134 env[1818]: time="2024-12-13T14:17:19.192081169Z" level=info msg="StartContainer for \"20780b84657de7d4af75e131cfb76ddb378620b39ee35a8c8011636d9856a607\"" Dec 13 14:17:19.219010 env[1818]: time="2024-12-13T14:17:19.218903329Z" level=info msg="CreateContainer within sandbox \"1c7ff81d36972557022972248d6026d3078b1dc2ebbf8b371f6dff12a3f16cf2\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:1,} returns container id \"7aa25be9c156ec5b889837581ae94859b7149cba1b2821402114917101e46c1e\"" Dec 13 14:17:19.220835 env[1818]: time="2024-12-13T14:17:19.220342754Z" level=info msg="StartContainer for \"7aa25be9c156ec5b889837581ae94859b7149cba1b2821402114917101e46c1e\"" Dec 13 14:17:19.240920 systemd[1]: Started cri-containerd-20780b84657de7d4af75e131cfb76ddb378620b39ee35a8c8011636d9856a607.scope. Dec 13 14:17:19.288000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.288000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.305613 kernel: audit: type=1400 audit(1734099439.288:1587): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.305752 kernel: audit: type=1400 audit(1734099439.288:1588): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.317319 kernel: audit: type=1400 audit(1734099439.288:1589): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.288000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.330630 kernel: audit: type=1400 audit(1734099439.288:1590): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.288000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.343742 kernel: audit: type=1400 audit(1734099439.288:1591): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.288000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.288000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.352387 kernel: audit: type=1400 audit(1734099439.288:1592): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.355080 systemd[1]: Started cri-containerd-7aa25be9c156ec5b889837581ae94859b7149cba1b2821402114917101e46c1e.scope. Dec 13 14:17:19.288000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.288000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.288000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.295000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.295000 audit: BPF prog-id=214 op=LOAD Dec 13 14:17:19.296000 audit[6194]: AVC avc: denied { bpf } for pid=6194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.296000 audit[6194]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=3345 pid=6194 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:19.296000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230373830623834363537646537643461663735653133316366623736 Dec 13 14:17:19.296000 audit[6194]: AVC avc: denied { perfmon } for pid=6194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.296000 audit[6194]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=3345 pid=6194 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:19.296000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230373830623834363537646537643461663735653133316366623736 Dec 13 14:17:19.296000 audit[6194]: AVC avc: denied { bpf } for pid=6194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.296000 audit[6194]: AVC avc: denied { bpf } for pid=6194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.296000 audit[6194]: AVC avc: denied { bpf } for pid=6194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.296000 audit[6194]: AVC avc: denied { perfmon } for pid=6194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.296000 audit[6194]: AVC avc: denied { perfmon } for pid=6194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.296000 audit[6194]: AVC avc: denied { perfmon } for pid=6194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.296000 audit[6194]: AVC avc: denied { perfmon } for pid=6194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.296000 audit[6194]: AVC avc: denied { perfmon } for pid=6194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.296000 audit[6194]: AVC avc: denied { bpf } for pid=6194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.296000 audit[6194]: AVC avc: denied { bpf } for pid=6194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.296000 audit: BPF prog-id=215 op=LOAD Dec 13 14:17:19.296000 audit[6194]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=3345 pid=6194 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:19.296000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230373830623834363537646537643461663735653133316366623736 Dec 13 14:17:19.296000 audit[6194]: AVC avc: denied { bpf } for pid=6194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.296000 audit[6194]: AVC avc: denied { bpf } for pid=6194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.296000 audit[6194]: AVC avc: denied { perfmon } for pid=6194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.296000 audit[6194]: AVC avc: denied { perfmon } for pid=6194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.296000 audit[6194]: AVC avc: denied { perfmon } for pid=6194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.296000 audit[6194]: AVC avc: denied { perfmon } for pid=6194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.296000 audit[6194]: AVC avc: denied { perfmon } for pid=6194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.296000 audit[6194]: AVC avc: denied { bpf } for pid=6194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.296000 audit[6194]: AVC avc: denied { bpf } for pid=6194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.296000 audit: BPF prog-id=216 op=LOAD Dec 13 14:17:19.296000 audit[6194]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=3345 pid=6194 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:19.296000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230373830623834363537646537643461663735653133316366623736 Dec 13 14:17:19.296000 audit: BPF prog-id=216 op=UNLOAD Dec 13 14:17:19.296000 audit: BPF prog-id=215 op=UNLOAD Dec 13 14:17:19.296000 audit[6194]: AVC avc: denied { bpf } for pid=6194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.296000 audit[6194]: AVC avc: denied { bpf } for pid=6194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.296000 audit[6194]: AVC avc: denied { bpf } for pid=6194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.296000 audit[6194]: AVC avc: denied { perfmon } for pid=6194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.296000 audit[6194]: AVC avc: denied { perfmon } for pid=6194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.296000 audit[6194]: AVC avc: denied { perfmon } for pid=6194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.296000 audit[6194]: AVC avc: denied { perfmon } for pid=6194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.296000 audit[6194]: AVC avc: denied { perfmon } for pid=6194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.296000 audit[6194]: AVC avc: denied { bpf } for pid=6194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.296000 audit[6194]: AVC avc: denied { bpf } for pid=6194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.296000 audit: BPF prog-id=217 op=LOAD Dec 13 14:17:19.296000 audit[6194]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=3345 pid=6194 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:19.296000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230373830623834363537646537643461663735653133316366623736 Dec 13 14:17:19.373698 env[1818]: time="2024-12-13T14:17:19.373620741Z" level=info msg="StartContainer for \"20780b84657de7d4af75e131cfb76ddb378620b39ee35a8c8011636d9856a607\" returns successfully" Dec 13 14:17:19.389000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.389000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.389000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.389000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.389000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.389000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.389000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.389000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.389000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.390000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.390000 audit: BPF prog-id=218 op=LOAD Dec 13 14:17:19.391000 audit[6219]: AVC avc: denied { bpf } for pid=6219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.391000 audit[6219]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400011db38 a2=10 a3=0 items=0 ppid=2518 pid=6219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:19.391000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761613235626539633135366563356238383938333735383161653934 Dec 13 14:17:19.391000 audit[6219]: AVC avc: denied { perfmon } for pid=6219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.391000 audit[6219]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400011d5a0 a2=3c a3=0 items=0 ppid=2518 pid=6219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:19.391000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761613235626539633135366563356238383938333735383161653934 Dec 13 14:17:19.391000 audit[6219]: AVC avc: denied { bpf } for pid=6219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.391000 audit[6219]: AVC avc: denied { bpf } for pid=6219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.391000 audit[6219]: AVC avc: denied { bpf } for pid=6219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.391000 audit[6219]: AVC avc: denied { perfmon } for pid=6219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.391000 audit[6219]: AVC avc: denied { perfmon } for pid=6219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.391000 audit[6219]: AVC avc: denied { perfmon } for pid=6219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.391000 audit[6219]: AVC avc: denied { perfmon } for pid=6219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.391000 audit[6219]: AVC avc: denied { perfmon } for pid=6219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.391000 audit[6219]: AVC avc: denied { bpf } for pid=6219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.391000 audit[6219]: AVC avc: denied { bpf } for pid=6219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.391000 audit: BPF prog-id=219 op=LOAD Dec 13 14:17:19.391000 audit[6219]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011d8e0 a2=78 a3=0 items=0 ppid=2518 pid=6219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:19.391000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761613235626539633135366563356238383938333735383161653934 Dec 13 14:17:19.391000 audit[6219]: AVC avc: denied { bpf } for pid=6219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.391000 audit[6219]: AVC avc: denied { bpf } for pid=6219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.391000 audit[6219]: AVC avc: denied { perfmon } for pid=6219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.391000 audit[6219]: AVC avc: denied { perfmon } for pid=6219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.391000 audit[6219]: AVC avc: denied { perfmon } for pid=6219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.391000 audit[6219]: AVC avc: denied { perfmon } for pid=6219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.391000 audit[6219]: AVC avc: denied { perfmon } for pid=6219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.391000 audit[6219]: AVC avc: denied { bpf } for pid=6219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.391000 audit[6219]: AVC avc: denied { bpf } for pid=6219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.391000 audit: BPF prog-id=220 op=LOAD Dec 13 14:17:19.391000 audit[6219]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400011d670 a2=78 a3=0 items=0 ppid=2518 pid=6219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:19.391000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761613235626539633135366563356238383938333735383161653934 Dec 13 14:17:19.391000 audit: BPF prog-id=220 op=UNLOAD Dec 13 14:17:19.391000 audit: BPF prog-id=219 op=UNLOAD Dec 13 14:17:19.391000 audit[6219]: AVC avc: denied { bpf } for pid=6219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.391000 audit[6219]: AVC avc: denied { bpf } for pid=6219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.391000 audit[6219]: AVC avc: denied { bpf } for pid=6219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.391000 audit[6219]: AVC avc: denied { perfmon } for pid=6219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.391000 audit[6219]: AVC avc: denied { perfmon } for pid=6219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.391000 audit[6219]: AVC avc: denied { perfmon } for pid=6219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.391000 audit[6219]: AVC avc: denied { perfmon } for pid=6219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.391000 audit[6219]: AVC avc: denied { perfmon } for pid=6219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.391000 audit[6219]: AVC avc: denied { bpf } for pid=6219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.391000 audit[6219]: AVC avc: denied { bpf } for pid=6219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:19.391000 audit: BPF prog-id=221 op=LOAD Dec 13 14:17:19.391000 audit[6219]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011db40 a2=78 a3=0 items=0 ppid=2518 pid=6219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:19.391000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761613235626539633135366563356238383938333735383161653934 Dec 13 14:17:19.449994 env[1818]: time="2024-12-13T14:17:19.449926048Z" level=info msg="StartContainer for \"7aa25be9c156ec5b889837581ae94859b7149cba1b2821402114917101e46c1e\" returns successfully" Dec 13 14:17:21.093748 systemd[1]: run-containerd-runc-k8s.io-7229709ced1bd250822fb8755b0fa47f6d2169b7dd128fa7731dbdb34347a9f2-runc.yyO5Sn.mount: Deactivated successfully. Dec 13 14:17:22.375455 systemd[1]: run-containerd-runc-k8s.io-7229709ced1bd250822fb8755b0fa47f6d2169b7dd128fa7731dbdb34347a9f2-runc.xotx7r.mount: Deactivated successfully. Dec 13 14:17:22.511000 audit[6236]: AVC avc: denied { watch } for pid=6236 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=8277 scontext=system_u:system_r:svirt_lxc_net_t:s0:c127,c295 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:17:22.511000 audit[6236]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=4000a94480 a2=fc6 a3=0 items=0 ppid=2518 pid=6236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c127,c295 key=(null) Dec 13 14:17:22.511000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:17:22.512000 audit[6236]: AVC avc: denied { watch } for pid=6236 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=8270 scontext=system_u:system_r:svirt_lxc_net_t:s0:c127,c295 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:17:22.512000 audit[6236]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=40004c64a0 a2=fc6 a3=0 items=0 ppid=2518 pid=6236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c127,c295 key=(null) Dec 13 14:17:22.512000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:17:24.435915 systemd[1]: cri-containerd-37495195846267a742cf787172d0972af29eb23419884ff748a6b75465ae1031.scope: Deactivated successfully. Dec 13 14:17:24.436494 systemd[1]: cri-containerd-37495195846267a742cf787172d0972af29eb23419884ff748a6b75465ae1031.scope: Consumed 3.406s CPU time. Dec 13 14:17:24.439000 audit: BPF prog-id=83 op=UNLOAD Dec 13 14:17:24.442842 kernel: kauditd_printk_skb: 114 callbacks suppressed Dec 13 14:17:24.442987 kernel: audit: type=1334 audit(1734099444.439:1625): prog-id=83 op=UNLOAD Dec 13 14:17:24.439000 audit: BPF prog-id=103 op=UNLOAD Dec 13 14:17:24.448209 kernel: audit: type=1334 audit(1734099444.439:1626): prog-id=103 op=UNLOAD Dec 13 14:17:24.475202 env[1818]: time="2024-12-13T14:17:24.475140416Z" level=info msg="shim disconnected" id=37495195846267a742cf787172d0972af29eb23419884ff748a6b75465ae1031 Dec 13 14:17:24.476167 env[1818]: time="2024-12-13T14:17:24.476111333Z" level=warning msg="cleaning up after shim disconnected" id=37495195846267a742cf787172d0972af29eb23419884ff748a6b75465ae1031 namespace=k8s.io Dec 13 14:17:24.476310 env[1818]: time="2024-12-13T14:17:24.476281387Z" level=info msg="cleaning up dead shim" Dec 13 14:17:24.486087 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-37495195846267a742cf787172d0972af29eb23419884ff748a6b75465ae1031-rootfs.mount: Deactivated successfully. Dec 13 14:17:24.493888 env[1818]: time="2024-12-13T14:17:24.493832270Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:17:24Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=6308 runtime=io.containerd.runc.v2\n" Dec 13 14:17:25.166595 kubelet[3066]: I1213 14:17:25.166561 3066 scope.go:117] "RemoveContainer" containerID="37495195846267a742cf787172d0972af29eb23419884ff748a6b75465ae1031" Dec 13 14:17:25.170998 env[1818]: time="2024-12-13T14:17:25.170936401Z" level=info msg="CreateContainer within sandbox \"628643ed321b59b8bf83e017c38d55997cd9b43fd25e53fa4cf988f61858a040\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:1,}" Dec 13 14:17:25.203691 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2855426506.mount: Deactivated successfully. Dec 13 14:17:25.210976 env[1818]: time="2024-12-13T14:17:25.210905483Z" level=info msg="CreateContainer within sandbox \"628643ed321b59b8bf83e017c38d55997cd9b43fd25e53fa4cf988f61858a040\" for &ContainerMetadata{Name:kube-scheduler,Attempt:1,} returns container id \"9b7d4d9f68d1d7ba6cb7037357e4b6c822609b59a5c1ed2d0e852441cca18c92\"" Dec 13 14:17:25.211681 env[1818]: time="2024-12-13T14:17:25.211620210Z" level=info msg="StartContainer for \"9b7d4d9f68d1d7ba6cb7037357e4b6c822609b59a5c1ed2d0e852441cca18c92\"" Dec 13 14:17:25.270603 systemd[1]: Started cri-containerd-9b7d4d9f68d1d7ba6cb7037357e4b6c822609b59a5c1ed2d0e852441cca18c92.scope. Dec 13 14:17:25.297000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:25.297000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:25.313694 kernel: audit: type=1400 audit(1734099445.297:1627): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:25.313847 kernel: audit: type=1400 audit(1734099445.297:1628): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:25.313914 kernel: audit: type=1400 audit(1734099445.297:1629): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:25.297000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:25.320018 kernel: audit: type=1400 audit(1734099445.297:1630): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:25.297000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:25.297000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:25.333681 kernel: audit: type=1400 audit(1734099445.297:1631): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:25.297000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:25.341577 kernel: audit: type=1400 audit(1734099445.297:1632): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:25.341769 kernel: audit: type=1400 audit(1734099445.297:1633): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:25.297000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:25.297000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:25.355462 kernel: audit: type=1400 audit(1734099445.297:1634): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:25.297000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:25.305000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:25.305000 audit: BPF prog-id=222 op=LOAD Dec 13 14:17:25.305000 audit[6329]: AVC avc: denied { bpf } for pid=6329 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:25.305000 audit[6329]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2511 pid=6329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:25.305000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962376434643966363864316437626136636237303337333537653462 Dec 13 14:17:25.305000 audit[6329]: AVC avc: denied { perfmon } for pid=6329 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:25.305000 audit[6329]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2511 pid=6329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:25.305000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962376434643966363864316437626136636237303337333537653462 Dec 13 14:17:25.305000 audit[6329]: AVC avc: denied { bpf } for pid=6329 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:25.305000 audit[6329]: AVC avc: denied { bpf } for pid=6329 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:25.305000 audit[6329]: AVC avc: denied { bpf } for pid=6329 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:25.305000 audit[6329]: AVC avc: denied { perfmon } for pid=6329 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:25.305000 audit[6329]: AVC avc: denied { perfmon } for pid=6329 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:25.305000 audit[6329]: AVC avc: denied { perfmon } for pid=6329 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:25.305000 audit[6329]: AVC avc: denied { perfmon } for pid=6329 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:25.305000 audit[6329]: AVC avc: denied { perfmon } for pid=6329 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:25.305000 audit[6329]: AVC avc: denied { bpf } for pid=6329 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:25.305000 audit[6329]: AVC avc: denied { bpf } for pid=6329 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:25.305000 audit: BPF prog-id=223 op=LOAD Dec 13 14:17:25.305000 audit[6329]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2511 pid=6329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:25.305000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962376434643966363864316437626136636237303337333537653462 Dec 13 14:17:25.312000 audit[6329]: AVC avc: denied { bpf } for pid=6329 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:25.312000 audit[6329]: AVC avc: denied { bpf } for pid=6329 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:25.312000 audit[6329]: AVC avc: denied { perfmon } for pid=6329 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:25.312000 audit[6329]: AVC avc: denied { perfmon } for pid=6329 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:25.312000 audit[6329]: AVC avc: denied { perfmon } for pid=6329 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:25.312000 audit[6329]: AVC avc: denied { perfmon } for pid=6329 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:25.312000 audit[6329]: AVC avc: denied { perfmon } for pid=6329 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:25.312000 audit[6329]: AVC avc: denied { bpf } for pid=6329 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:25.312000 audit[6329]: AVC avc: denied { bpf } for pid=6329 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:25.312000 audit: BPF prog-id=224 op=LOAD Dec 13 14:17:25.312000 audit[6329]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2511 pid=6329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:25.312000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962376434643966363864316437626136636237303337333537653462 Dec 13 14:17:25.319000 audit: BPF prog-id=224 op=UNLOAD Dec 13 14:17:25.319000 audit: BPF prog-id=223 op=UNLOAD Dec 13 14:17:25.319000 audit[6329]: AVC avc: denied { bpf } for pid=6329 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:25.319000 audit[6329]: AVC avc: denied { bpf } for pid=6329 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:25.319000 audit[6329]: AVC avc: denied { bpf } for pid=6329 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:25.319000 audit[6329]: AVC avc: denied { perfmon } for pid=6329 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:25.319000 audit[6329]: AVC avc: denied { perfmon } for pid=6329 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:25.319000 audit[6329]: AVC avc: denied { perfmon } for pid=6329 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:25.319000 audit[6329]: AVC avc: denied { perfmon } for pid=6329 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:25.319000 audit[6329]: AVC avc: denied { perfmon } for pid=6329 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:25.319000 audit[6329]: AVC avc: denied { bpf } for pid=6329 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:25.319000 audit[6329]: AVC avc: denied { bpf } for pid=6329 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:17:25.319000 audit: BPF prog-id=225 op=LOAD Dec 13 14:17:25.319000 audit[6329]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2511 pid=6329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:17:25.319000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962376434643966363864316437626136636237303337333537653462 Dec 13 14:17:25.402040 kubelet[3066]: E1213 14:17:25.401380 3066 controller.go:195] "Failed to update lease" err="Put \"https://172.31.18.231:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-18-231?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Dec 13 14:17:25.404808 env[1818]: time="2024-12-13T14:17:25.404684466Z" level=info msg="StartContainer for \"9b7d4d9f68d1d7ba6cb7037357e4b6c822609b59a5c1ed2d0e852441cca18c92\" returns successfully" Dec 13 14:17:29.561300 systemd[1]: run-containerd-runc-k8s.io-1e8797ae33a4253a5d34ec17f2b3fb7160c980bfe3c8132ebd8ccf9ce8e52006-runc.c3vGXU.mount: Deactivated successfully. Dec 13 14:17:35.402130 kubelet[3066]: E1213 14:17:35.402067 3066 controller.go:195] "Failed to update lease" err="Put \"https://172.31.18.231:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ip-172-31-18-231?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Dec 13 14:17:37.668000 audit[2638]: AVC avc: denied { watch } for pid=2638 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=8277 scontext=system_u:system_r:svirt_lxc_net_t:s0:c190,c319 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:17:37.670821 kernel: kauditd_printk_skb: 49 callbacks suppressed Dec 13 14:17:37.670957 kernel: audit: type=1400 audit(1734099457.668:1645): avc: denied { watch } for pid=2638 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=8277 scontext=system_u:system_r:svirt_lxc_net_t:s0:c190,c319 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:17:37.668000 audit[2638]: AVC avc: denied { watch } for pid=2638 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=8272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c190,c319 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:17:37.688818 kernel: audit: type=1400 audit(1734099457.668:1646): avc: denied { watch } for pid=2638 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=8272 scontext=system_u:system_r:svirt_lxc_net_t:s0:c190,c319 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:17:37.688936 kernel: audit: type=1300 audit(1734099457.668:1646): arch=c00000b7 syscall=27 success=no exit=-13 a0=16 a1=4014e3b0e0 a2=fc6 a3=0 items=0 ppid=2488 pid=2638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c190,c319 key=(null) Dec 13 14:17:37.668000 audit[2638]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=16 a1=4014e3b0e0 a2=fc6 a3=0 items=0 ppid=2488 pid=2638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c190,c319 key=(null) Dec 13 14:17:37.668000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31382E323331002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:17:37.709780 kernel: audit: type=1327 audit(1734099457.668:1646): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31382E323331002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:17:37.709936 kernel: audit: type=1400 audit(1734099457.668:1647): avc: denied { watch } for pid=2638 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=8270 scontext=system_u:system_r:svirt_lxc_net_t:s0:c190,c319 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:17:37.668000 audit[2638]: AVC avc: denied { watch } for pid=2638 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=8270 scontext=system_u:system_r:svirt_lxc_net_t:s0:c190,c319 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:17:37.668000 audit[2638]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=16 a1=400e156340 a2=fc6 a3=0 items=0 ppid=2488 pid=2638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c190,c319 key=(null) Dec 13 14:17:37.729773 kernel: audit: type=1300 audit(1734099457.668:1647): arch=c00000b7 syscall=27 success=no exit=-13 a0=16 a1=400e156340 a2=fc6 a3=0 items=0 ppid=2488 pid=2638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c190,c319 key=(null) Dec 13 14:17:37.729941 kernel: audit: type=1327 audit(1734099457.668:1647): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31382E323331002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:17:37.668000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31382E323331002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:17:37.668000 audit[2638]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=15 a1=4014e23a40 a2=fc6 a3=0 items=0 ppid=2488 pid=2638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c190,c319 key=(null) Dec 13 14:17:37.751069 kernel: audit: type=1300 audit(1734099457.668:1645): arch=c00000b7 syscall=27 success=no exit=-13 a0=15 a1=4014e23a40 a2=fc6 a3=0 items=0 ppid=2488 pid=2638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c190,c319 key=(null) Dec 13 14:17:37.751164 kernel: audit: type=1327 audit(1734099457.668:1645): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31382E323331002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:17:37.668000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31382E323331002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:17:37.760583 kernel: audit: type=1400 audit(1734099457.686:1648): avc: denied { watch } for pid=2638 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=8279 scontext=system_u:system_r:svirt_lxc_net_t:s0:c190,c319 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:17:37.686000 audit[2638]: AVC avc: denied { watch } for pid=2638 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=8279 scontext=system_u:system_r:svirt_lxc_net_t:s0:c190,c319 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:17:37.686000 audit[2638]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=15 a1=4014e3b290 a2=fc6 a3=0 items=0 ppid=2488 pid=2638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c190,c319 key=(null) Dec 13 14:17:37.686000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31382E323331002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:17:37.692000 audit[2638]: AVC avc: denied { watch } for pid=2638 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=8277 scontext=system_u:system_r:svirt_lxc_net_t:s0:c190,c319 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:17:37.692000 audit[2638]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=15 a1=4014e23b00 a2=fc6 a3=0 items=0 ppid=2488 pid=2638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c190,c319 key=(null) Dec 13 14:17:37.692000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31382E323331002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Dec 13 14:17:37.692000 audit[2638]: AVC avc: denied { watch } for pid=2638 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=8270 scontext=system_u:system_r:svirt_lxc_net_t:s0:c190,c319 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:17:37.692000 audit[2638]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=15 a1=400e1566a0 a2=fc6 a3=0 items=0 ppid=2488 pid=2638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c190,c319 key=(null) Dec 13 14:17:37.692000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31382E323331002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75