Mar 17 22:03:37.973795 kernel: Linux version 5.15.179-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Mon Mar 17 17:12:34 -00 2025 Mar 17 22:03:37.973842 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=249ccd113f901380672c0d31e18f792e8e0344094c0e39eedc449f039418b31a Mar 17 22:03:37.973862 kernel: BIOS-provided physical RAM map: Mar 17 22:03:37.973873 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Mar 17 22:03:37.973883 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Mar 17 22:03:37.973893 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Mar 17 22:03:37.973905 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000007ffdbfff] usable Mar 17 22:03:37.973916 kernel: BIOS-e820: [mem 0x000000007ffdc000-0x000000007fffffff] reserved Mar 17 22:03:37.973926 kernel: BIOS-e820: [mem 0x00000000b0000000-0x00000000bfffffff] reserved Mar 17 22:03:37.973937 kernel: BIOS-e820: [mem 0x00000000fed1c000-0x00000000fed1ffff] reserved Mar 17 22:03:37.973951 kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved Mar 17 22:03:37.973962 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Mar 17 22:03:37.973972 kernel: NX (Execute Disable) protection: active Mar 17 22:03:37.973983 kernel: SMBIOS 2.8 present. Mar 17 22:03:37.973996 kernel: DMI: Red Hat KVM/RHEL-AV, BIOS 1.13.0-2.module_el8.5.0+2608+72063365 04/01/2014 Mar 17 22:03:37.974007 kernel: Hypervisor detected: KVM Mar 17 22:03:37.974023 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Mar 17 22:03:37.974034 kernel: kvm-clock: cpu 0, msr 7019a001, primary cpu clock Mar 17 22:03:37.974045 kernel: kvm-clock: using sched offset of 4898849305 cycles Mar 17 22:03:37.974076 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Mar 17 22:03:37.974100 kernel: tsc: Detected 2499.998 MHz processor Mar 17 22:03:37.975112 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Mar 17 22:03:37.975134 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Mar 17 22:03:37.975147 kernel: last_pfn = 0x7ffdc max_arch_pfn = 0x400000000 Mar 17 22:03:37.975158 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Mar 17 22:03:37.975177 kernel: Using GB pages for direct mapping Mar 17 22:03:37.975188 kernel: ACPI: Early table checksum verification disabled Mar 17 22:03:37.975199 kernel: ACPI: RSDP 0x00000000000F5AA0 000014 (v00 BOCHS ) Mar 17 22:03:37.975211 kernel: ACPI: RSDT 0x000000007FFE47A5 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) Mar 17 22:03:37.975222 kernel: ACPI: FACP 0x000000007FFE438D 0000F4 (v03 BOCHS BXPC 00000001 BXPC 00000001) Mar 17 22:03:37.975234 kernel: ACPI: DSDT 0x000000007FFDFD80 00460D (v01 BOCHS BXPC 00000001 BXPC 00000001) Mar 17 22:03:37.975246 kernel: ACPI: FACS 0x000000007FFDFD40 000040 Mar 17 22:03:37.975257 kernel: ACPI: APIC 0x000000007FFE4481 0000F0 (v01 BOCHS BXPC 00000001 BXPC 00000001) Mar 17 22:03:37.975268 kernel: ACPI: SRAT 0x000000007FFE4571 0001D0 (v01 BOCHS BXPC 00000001 BXPC 00000001) Mar 17 22:03:37.975284 kernel: ACPI: MCFG 0x000000007FFE4741 00003C (v01 BOCHS BXPC 00000001 BXPC 00000001) Mar 17 22:03:37.975295 kernel: ACPI: WAET 0x000000007FFE477D 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) Mar 17 22:03:37.975307 kernel: ACPI: Reserving FACP table memory at [mem 0x7ffe438d-0x7ffe4480] Mar 17 22:03:37.975318 kernel: ACPI: Reserving DSDT table memory at [mem 0x7ffdfd80-0x7ffe438c] Mar 17 22:03:37.975329 kernel: ACPI: Reserving FACS table memory at [mem 0x7ffdfd40-0x7ffdfd7f] Mar 17 22:03:37.975341 kernel: ACPI: Reserving APIC table memory at [mem 0x7ffe4481-0x7ffe4570] Mar 17 22:03:37.975358 kernel: ACPI: Reserving SRAT table memory at [mem 0x7ffe4571-0x7ffe4740] Mar 17 22:03:37.975375 kernel: ACPI: Reserving MCFG table memory at [mem 0x7ffe4741-0x7ffe477c] Mar 17 22:03:37.975387 kernel: ACPI: Reserving WAET table memory at [mem 0x7ffe477d-0x7ffe47a4] Mar 17 22:03:37.975399 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Mar 17 22:03:37.975411 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Mar 17 22:03:37.975423 kernel: SRAT: PXM 0 -> APIC 0x02 -> Node 0 Mar 17 22:03:37.975435 kernel: SRAT: PXM 0 -> APIC 0x03 -> Node 0 Mar 17 22:03:37.975447 kernel: SRAT: PXM 0 -> APIC 0x04 -> Node 0 Mar 17 22:03:37.975463 kernel: SRAT: PXM 0 -> APIC 0x05 -> Node 0 Mar 17 22:03:37.975475 kernel: SRAT: PXM 0 -> APIC 0x06 -> Node 0 Mar 17 22:03:37.975487 kernel: SRAT: PXM 0 -> APIC 0x07 -> Node 0 Mar 17 22:03:37.975499 kernel: SRAT: PXM 0 -> APIC 0x08 -> Node 0 Mar 17 22:03:37.975510 kernel: SRAT: PXM 0 -> APIC 0x09 -> Node 0 Mar 17 22:03:37.975522 kernel: SRAT: PXM 0 -> APIC 0x0a -> Node 0 Mar 17 22:03:37.975534 kernel: SRAT: PXM 0 -> APIC 0x0b -> Node 0 Mar 17 22:03:37.975546 kernel: SRAT: PXM 0 -> APIC 0x0c -> Node 0 Mar 17 22:03:37.975558 kernel: SRAT: PXM 0 -> APIC 0x0d -> Node 0 Mar 17 22:03:37.975570 kernel: SRAT: PXM 0 -> APIC 0x0e -> Node 0 Mar 17 22:03:37.975586 kernel: SRAT: PXM 0 -> APIC 0x0f -> Node 0 Mar 17 22:03:37.975598 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x0009ffff] Mar 17 22:03:37.975610 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00100000-0x7fffffff] Mar 17 22:03:37.975622 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000-0x20800fffff] hotplug Mar 17 22:03:37.975634 kernel: NUMA: Node 0 [mem 0x00000000-0x0009ffff] + [mem 0x00100000-0x7ffdbfff] -> [mem 0x00000000-0x7ffdbfff] Mar 17 22:03:37.975646 kernel: NODE_DATA(0) allocated [mem 0x7ffd6000-0x7ffdbfff] Mar 17 22:03:37.975659 kernel: Zone ranges: Mar 17 22:03:37.975671 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Mar 17 22:03:37.975683 kernel: DMA32 [mem 0x0000000001000000-0x000000007ffdbfff] Mar 17 22:03:37.975699 kernel: Normal empty Mar 17 22:03:37.975712 kernel: Movable zone start for each node Mar 17 22:03:37.975723 kernel: Early memory node ranges Mar 17 22:03:37.975735 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Mar 17 22:03:37.975747 kernel: node 0: [mem 0x0000000000100000-0x000000007ffdbfff] Mar 17 22:03:37.975759 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007ffdbfff] Mar 17 22:03:37.975771 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Mar 17 22:03:37.975783 kernel: On node 0, zone DMA: 97 pages in unavailable ranges Mar 17 22:03:37.975795 kernel: On node 0, zone DMA32: 36 pages in unavailable ranges Mar 17 22:03:37.975811 kernel: ACPI: PM-Timer IO Port: 0x608 Mar 17 22:03:37.975823 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Mar 17 22:03:37.975835 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Mar 17 22:03:37.975847 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Mar 17 22:03:37.975859 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Mar 17 22:03:37.975871 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Mar 17 22:03:37.975883 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Mar 17 22:03:37.975895 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Mar 17 22:03:37.975907 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Mar 17 22:03:37.975923 kernel: TSC deadline timer available Mar 17 22:03:37.975935 kernel: smpboot: Allowing 16 CPUs, 14 hotplug CPUs Mar 17 22:03:37.975947 kernel: [mem 0xc0000000-0xfed1bfff] available for PCI devices Mar 17 22:03:37.975959 kernel: Booting paravirtualized kernel on KVM Mar 17 22:03:37.975971 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Mar 17 22:03:37.975983 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:16 nr_node_ids:1 Mar 17 22:03:37.975995 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u262144 Mar 17 22:03:37.976007 kernel: pcpu-alloc: s188696 r8192 d32488 u262144 alloc=1*2097152 Mar 17 22:03:37.976019 kernel: pcpu-alloc: [0] 00 01 02 03 04 05 06 07 [0] 08 09 10 11 12 13 14 15 Mar 17 22:03:37.976035 kernel: kvm-guest: stealtime: cpu 0, msr 7da1c0c0 Mar 17 22:03:37.976047 kernel: kvm-guest: PV spinlocks enabled Mar 17 22:03:37.976073 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Mar 17 22:03:37.976114 kernel: Built 1 zonelists, mobility grouping on. Total pages: 515804 Mar 17 22:03:37.976127 kernel: Policy zone: DMA32 Mar 17 22:03:37.976140 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=249ccd113f901380672c0d31e18f792e8e0344094c0e39eedc449f039418b31a Mar 17 22:03:37.976153 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Mar 17 22:03:37.976165 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Mar 17 22:03:37.976183 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) Mar 17 22:03:37.976196 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Mar 17 22:03:37.976208 kernel: Memory: 1903832K/2096616K available (12294K kernel code, 2278K rwdata, 13724K rodata, 47472K init, 4108K bss, 192524K reserved, 0K cma-reserved) Mar 17 22:03:37.976221 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=16, Nodes=1 Mar 17 22:03:37.976233 kernel: Kernel/User page tables isolation: enabled Mar 17 22:03:37.976245 kernel: ftrace: allocating 34580 entries in 136 pages Mar 17 22:03:37.976257 kernel: ftrace: allocated 136 pages with 2 groups Mar 17 22:03:37.976268 kernel: rcu: Hierarchical RCU implementation. Mar 17 22:03:37.976281 kernel: rcu: RCU event tracing is enabled. Mar 17 22:03:37.976298 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=16. Mar 17 22:03:37.976310 kernel: Rude variant of Tasks RCU enabled. Mar 17 22:03:37.976323 kernel: Tracing variant of Tasks RCU enabled. Mar 17 22:03:37.976335 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Mar 17 22:03:37.976347 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=16 Mar 17 22:03:37.976359 kernel: NR_IRQS: 33024, nr_irqs: 552, preallocated irqs: 16 Mar 17 22:03:37.976371 kernel: random: crng init done Mar 17 22:03:37.976397 kernel: Console: colour VGA+ 80x25 Mar 17 22:03:37.976410 kernel: printk: console [tty0] enabled Mar 17 22:03:37.976422 kernel: printk: console [ttyS0] enabled Mar 17 22:03:37.976435 kernel: ACPI: Core revision 20210730 Mar 17 22:03:37.976447 kernel: APIC: Switch to symmetric I/O mode setup Mar 17 22:03:37.976464 kernel: x2apic enabled Mar 17 22:03:37.976476 kernel: Switched APIC routing to physical x2apic. Mar 17 22:03:37.976489 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x240937b9988, max_idle_ns: 440795218083 ns Mar 17 22:03:37.976502 kernel: Calibrating delay loop (skipped) preset value.. 4999.99 BogoMIPS (lpj=2499998) Mar 17 22:03:37.976515 kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated Mar 17 22:03:37.976532 kernel: Last level iTLB entries: 4KB 0, 2MB 0, 4MB 0 Mar 17 22:03:37.976545 kernel: Last level dTLB entries: 4KB 0, 2MB 0, 4MB 0, 1GB 0 Mar 17 22:03:37.976557 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Mar 17 22:03:37.976570 kernel: Spectre V2 : Mitigation: Retpolines Mar 17 22:03:37.976582 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Mar 17 22:03:37.976595 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Mar 17 22:03:37.976607 kernel: Spectre V2 : Enabling Restricted Speculation for firmware calls Mar 17 22:03:37.976620 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Mar 17 22:03:37.976632 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Mar 17 22:03:37.976645 kernel: MDS: Mitigation: Clear CPU buffers Mar 17 22:03:37.976657 kernel: MMIO Stale Data: Unknown: No mitigations Mar 17 22:03:37.976673 kernel: SRBDS: Unknown: Dependent on hypervisor status Mar 17 22:03:37.976686 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Mar 17 22:03:37.976698 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Mar 17 22:03:37.976711 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Mar 17 22:03:37.976723 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Mar 17 22:03:37.976736 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. Mar 17 22:03:37.976748 kernel: Freeing SMP alternatives memory: 32K Mar 17 22:03:37.976761 kernel: pid_max: default: 32768 minimum: 301 Mar 17 22:03:37.976773 kernel: LSM: Security Framework initializing Mar 17 22:03:37.976785 kernel: SELinux: Initializing. Mar 17 22:03:37.976798 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Mar 17 22:03:37.976814 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Mar 17 22:03:37.976827 kernel: smpboot: CPU0: Intel Xeon E3-12xx v2 (Ivy Bridge, IBRS) (family: 0x6, model: 0x3a, stepping: 0x9) Mar 17 22:03:37.976840 kernel: Performance Events: unsupported p6 CPU model 58 no PMU driver, software events only. Mar 17 22:03:37.976852 kernel: signal: max sigframe size: 1776 Mar 17 22:03:37.976865 kernel: rcu: Hierarchical SRCU implementation. Mar 17 22:03:37.976878 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Mar 17 22:03:37.976890 kernel: smp: Bringing up secondary CPUs ... Mar 17 22:03:37.976903 kernel: x86: Booting SMP configuration: Mar 17 22:03:37.976916 kernel: .... node #0, CPUs: #1 Mar 17 22:03:37.976933 kernel: kvm-clock: cpu 1, msr 7019a041, secondary cpu clock Mar 17 22:03:37.976946 kernel: smpboot: CPU 1 Converting physical 0 to logical die 1 Mar 17 22:03:37.976958 kernel: kvm-guest: stealtime: cpu 1, msr 7da5c0c0 Mar 17 22:03:37.976971 kernel: smp: Brought up 1 node, 2 CPUs Mar 17 22:03:37.976983 kernel: smpboot: Max logical packages: 16 Mar 17 22:03:37.976996 kernel: smpboot: Total of 2 processors activated (9999.99 BogoMIPS) Mar 17 22:03:37.977008 kernel: devtmpfs: initialized Mar 17 22:03:37.977021 kernel: x86/mm: Memory block size: 128MB Mar 17 22:03:37.977034 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Mar 17 22:03:37.977046 kernel: futex hash table entries: 4096 (order: 6, 262144 bytes, linear) Mar 17 22:03:37.977074 kernel: pinctrl core: initialized pinctrl subsystem Mar 17 22:03:37.979936 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Mar 17 22:03:37.979960 kernel: audit: initializing netlink subsys (disabled) Mar 17 22:03:37.979974 kernel: audit: type=2000 audit(1742249016.510:1): state=initialized audit_enabled=0 res=1 Mar 17 22:03:37.979988 kernel: thermal_sys: Registered thermal governor 'step_wise' Mar 17 22:03:37.980000 kernel: thermal_sys: Registered thermal governor 'user_space' Mar 17 22:03:37.980014 kernel: cpuidle: using governor menu Mar 17 22:03:37.980027 kernel: ACPI: bus type PCI registered Mar 17 22:03:37.980040 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Mar 17 22:03:37.980072 kernel: dca service started, version 1.12.1 Mar 17 22:03:37.980107 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xb0000000-0xbfffffff] (base 0xb0000000) Mar 17 22:03:37.980122 kernel: PCI: MMCONFIG at [mem 0xb0000000-0xbfffffff] reserved in E820 Mar 17 22:03:37.980135 kernel: PCI: Using configuration type 1 for base access Mar 17 22:03:37.980148 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Mar 17 22:03:37.980160 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Mar 17 22:03:37.980173 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Mar 17 22:03:37.980186 kernel: ACPI: Added _OSI(Module Device) Mar 17 22:03:37.980204 kernel: ACPI: Added _OSI(Processor Device) Mar 17 22:03:37.980218 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Mar 17 22:03:37.980230 kernel: ACPI: Added _OSI(Processor Aggregator Device) Mar 17 22:03:37.980243 kernel: ACPI: Added _OSI(Linux-Dell-Video) Mar 17 22:03:37.980256 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Mar 17 22:03:37.980268 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Mar 17 22:03:37.980281 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Mar 17 22:03:37.980294 kernel: ACPI: Interpreter enabled Mar 17 22:03:37.980306 kernel: ACPI: PM: (supports S0 S5) Mar 17 22:03:37.980319 kernel: ACPI: Using IOAPIC for interrupt routing Mar 17 22:03:37.980336 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Mar 17 22:03:37.980349 kernel: ACPI: Enabled 2 GPEs in block 00 to 3F Mar 17 22:03:37.980362 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Mar 17 22:03:37.980680 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Mar 17 22:03:37.980844 kernel: acpi PNP0A08:00: _OSC: platform does not support [LTR] Mar 17 22:03:37.980999 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME AER PCIeCapability] Mar 17 22:03:37.981019 kernel: PCI host bridge to bus 0000:00 Mar 17 22:03:37.981219 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Mar 17 22:03:37.981366 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Mar 17 22:03:37.981509 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Mar 17 22:03:37.981650 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xafffffff window] Mar 17 22:03:37.981791 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] Mar 17 22:03:37.981932 kernel: pci_bus 0000:00: root bus resource [mem 0x20c0000000-0x28bfffffff window] Mar 17 22:03:37.986310 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Mar 17 22:03:37.986586 kernel: pci 0000:00:00.0: [8086:29c0] type 00 class 0x060000 Mar 17 22:03:37.986777 kernel: pci 0000:00:01.0: [1013:00b8] type 00 class 0x030000 Mar 17 22:03:37.986941 kernel: pci 0000:00:01.0: reg 0x10: [mem 0xfa000000-0xfbffffff pref] Mar 17 22:03:37.987142 kernel: pci 0000:00:01.0: reg 0x14: [mem 0xfea50000-0xfea50fff] Mar 17 22:03:37.987301 kernel: pci 0000:00:01.0: reg 0x30: [mem 0xfea40000-0xfea4ffff pref] Mar 17 22:03:37.987456 kernel: pci 0000:00:01.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Mar 17 22:03:37.987634 kernel: pci 0000:00:02.0: [1b36:000c] type 01 class 0x060400 Mar 17 22:03:37.987793 kernel: pci 0000:00:02.0: reg 0x10: [mem 0xfea51000-0xfea51fff] Mar 17 22:03:37.987972 kernel: pci 0000:00:02.1: [1b36:000c] type 01 class 0x060400 Mar 17 22:03:37.988160 kernel: pci 0000:00:02.1: reg 0x10: [mem 0xfea52000-0xfea52fff] Mar 17 22:03:37.988334 kernel: pci 0000:00:02.2: [1b36:000c] type 01 class 0x060400 Mar 17 22:03:37.988491 kernel: pci 0000:00:02.2: reg 0x10: [mem 0xfea53000-0xfea53fff] Mar 17 22:03:37.988658 kernel: pci 0000:00:02.3: [1b36:000c] type 01 class 0x060400 Mar 17 22:03:37.988819 kernel: pci 0000:00:02.3: reg 0x10: [mem 0xfea54000-0xfea54fff] Mar 17 22:03:37.989012 kernel: pci 0000:00:02.4: [1b36:000c] type 01 class 0x060400 Mar 17 22:03:37.989202 kernel: pci 0000:00:02.4: reg 0x10: [mem 0xfea55000-0xfea55fff] Mar 17 22:03:37.989372 kernel: pci 0000:00:02.5: [1b36:000c] type 01 class 0x060400 Mar 17 22:03:37.989533 kernel: pci 0000:00:02.5: reg 0x10: [mem 0xfea56000-0xfea56fff] Mar 17 22:03:37.989708 kernel: pci 0000:00:02.6: [1b36:000c] type 01 class 0x060400 Mar 17 22:03:37.989872 kernel: pci 0000:00:02.6: reg 0x10: [mem 0xfea57000-0xfea57fff] Mar 17 22:03:37.990039 kernel: pci 0000:00:02.7: [1b36:000c] type 01 class 0x060400 Mar 17 22:03:37.990226 kernel: pci 0000:00:02.7: reg 0x10: [mem 0xfea58000-0xfea58fff] Mar 17 22:03:37.990393 kernel: pci 0000:00:03.0: [1af4:1000] type 00 class 0x020000 Mar 17 22:03:37.990553 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc0c0-0xc0df] Mar 17 22:03:37.990711 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xfea59000-0xfea59fff] Mar 17 22:03:37.990878 kernel: pci 0000:00:03.0: reg 0x20: [mem 0xfd000000-0xfd003fff 64bit pref] Mar 17 22:03:37.991036 kernel: pci 0000:00:03.0: reg 0x30: [mem 0xfea00000-0xfea3ffff pref] Mar 17 22:03:37.994282 kernel: pci 0000:00:04.0: [1af4:1001] type 00 class 0x010000 Mar 17 22:03:37.994471 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc000-0xc07f] Mar 17 22:03:37.994656 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xfea5a000-0xfea5afff] Mar 17 22:03:37.994836 kernel: pci 0000:00:04.0: reg 0x20: [mem 0xfd004000-0xfd007fff 64bit pref] Mar 17 22:03:37.995039 kernel: pci 0000:00:1f.0: [8086:2918] type 00 class 0x060100 Mar 17 22:03:37.996294 kernel: pci 0000:00:1f.0: quirk: [io 0x0600-0x067f] claimed by ICH6 ACPI/GPIO/TCO Mar 17 22:03:37.996500 kernel: pci 0000:00:1f.2: [8086:2922] type 00 class 0x010601 Mar 17 22:03:37.996679 kernel: pci 0000:00:1f.2: reg 0x20: [io 0xc0e0-0xc0ff] Mar 17 22:03:37.996854 kernel: pci 0000:00:1f.2: reg 0x24: [mem 0xfea5b000-0xfea5bfff] Mar 17 22:03:37.997105 kernel: pci 0000:00:1f.3: [8086:2930] type 00 class 0x0c0500 Mar 17 22:03:37.998317 kernel: pci 0000:00:1f.3: reg 0x20: [io 0x0700-0x073f] Mar 17 22:03:37.998496 kernel: pci 0000:01:00.0: [1b36:000e] type 01 class 0x060400 Mar 17 22:03:37.998692 kernel: pci 0000:01:00.0: reg 0x10: [mem 0xfda00000-0xfda000ff 64bit] Mar 17 22:03:37.998855 kernel: pci 0000:00:02.0: PCI bridge to [bus 01-02] Mar 17 22:03:37.999011 kernel: pci 0000:00:02.0: bridge window [mem 0xfd800000-0xfdbfffff] Mar 17 22:03:37.999320 kernel: pci 0000:00:02.0: bridge window [mem 0xfce00000-0xfcffffff 64bit pref] Mar 17 22:03:37.999500 kernel: pci_bus 0000:02: extended config space not accessible Mar 17 22:03:37.999690 kernel: pci 0000:02:01.0: [8086:25ab] type 00 class 0x088000 Mar 17 22:03:37.999859 kernel: pci 0000:02:01.0: reg 0x10: [mem 0xfd800000-0xfd80000f] Mar 17 22:03:38.000020 kernel: pci 0000:01:00.0: PCI bridge to [bus 02] Mar 17 22:03:38.000220 kernel: pci 0000:01:00.0: bridge window [mem 0xfd800000-0xfd9fffff] Mar 17 22:03:38.000395 kernel: pci 0000:03:00.0: [1b36:000d] type 00 class 0x0c0330 Mar 17 22:03:38.000557 kernel: pci 0000:03:00.0: reg 0x10: [mem 0xfe800000-0xfe803fff 64bit] Mar 17 22:03:38.000718 kernel: pci 0000:00:02.1: PCI bridge to [bus 03] Mar 17 22:03:38.000883 kernel: pci 0000:00:02.1: bridge window [mem 0xfe800000-0xfe9fffff] Mar 17 22:03:38.001037 kernel: pci 0000:00:02.1: bridge window [mem 0xfcc00000-0xfcdfffff 64bit pref] Mar 17 22:03:38.001245 kernel: pci 0000:04:00.0: [1af4:1044] type 00 class 0x00ff00 Mar 17 22:03:38.001411 kernel: pci 0000:04:00.0: reg 0x20: [mem 0xfca00000-0xfca03fff 64bit pref] Mar 17 22:03:38.001574 kernel: pci 0000:00:02.2: PCI bridge to [bus 04] Mar 17 22:03:38.001732 kernel: pci 0000:00:02.2: bridge window [mem 0xfe600000-0xfe7fffff] Mar 17 22:03:38.001889 kernel: pci 0000:00:02.2: bridge window [mem 0xfca00000-0xfcbfffff 64bit pref] Mar 17 22:03:38.002062 kernel: pci 0000:00:02.3: PCI bridge to [bus 05] Mar 17 22:03:38.002245 kernel: pci 0000:00:02.3: bridge window [mem 0xfe400000-0xfe5fffff] Mar 17 22:03:38.002403 kernel: pci 0000:00:02.3: bridge window [mem 0xfc800000-0xfc9fffff 64bit pref] Mar 17 22:03:38.002560 kernel: pci 0000:00:02.4: PCI bridge to [bus 06] Mar 17 22:03:38.002719 kernel: pci 0000:00:02.4: bridge window [mem 0xfe200000-0xfe3fffff] Mar 17 22:03:38.002875 kernel: pci 0000:00:02.4: bridge window [mem 0xfc600000-0xfc7fffff 64bit pref] Mar 17 22:03:38.003037 kernel: pci 0000:00:02.5: PCI bridge to [bus 07] Mar 17 22:03:38.008380 kernel: pci 0000:00:02.5: bridge window [mem 0xfe000000-0xfe1fffff] Mar 17 22:03:38.008558 kernel: pci 0000:00:02.5: bridge window [mem 0xfc400000-0xfc5fffff 64bit pref] Mar 17 22:03:38.008737 kernel: pci 0000:00:02.6: PCI bridge to [bus 08] Mar 17 22:03:38.008897 kernel: pci 0000:00:02.6: bridge window [mem 0xfde00000-0xfdffffff] Mar 17 22:03:38.012112 kernel: pci 0000:00:02.6: bridge window [mem 0xfc200000-0xfc3fffff 64bit pref] Mar 17 22:03:38.012310 kernel: pci 0000:00:02.7: PCI bridge to [bus 09] Mar 17 22:03:38.012477 kernel: pci 0000:00:02.7: bridge window [mem 0xfdc00000-0xfddfffff] Mar 17 22:03:38.012639 kernel: pci 0000:00:02.7: bridge window [mem 0xfc000000-0xfc1fffff 64bit pref] Mar 17 22:03:38.012660 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Mar 17 22:03:38.012674 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Mar 17 22:03:38.012696 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Mar 17 22:03:38.012709 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Mar 17 22:03:38.012722 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 10 Mar 17 22:03:38.012735 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 10 Mar 17 22:03:38.012748 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 11 Mar 17 22:03:38.012761 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 11 Mar 17 22:03:38.012774 kernel: ACPI: PCI: Interrupt link GSIA configured for IRQ 16 Mar 17 22:03:38.012787 kernel: ACPI: PCI: Interrupt link GSIB configured for IRQ 17 Mar 17 22:03:38.012800 kernel: ACPI: PCI: Interrupt link GSIC configured for IRQ 18 Mar 17 22:03:38.012818 kernel: ACPI: PCI: Interrupt link GSID configured for IRQ 19 Mar 17 22:03:38.012831 kernel: ACPI: PCI: Interrupt link GSIE configured for IRQ 20 Mar 17 22:03:38.012844 kernel: ACPI: PCI: Interrupt link GSIF configured for IRQ 21 Mar 17 22:03:38.012857 kernel: ACPI: PCI: Interrupt link GSIG configured for IRQ 22 Mar 17 22:03:38.012870 kernel: ACPI: PCI: Interrupt link GSIH configured for IRQ 23 Mar 17 22:03:38.012883 kernel: iommu: Default domain type: Translated Mar 17 22:03:38.012896 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Mar 17 22:03:38.013116 kernel: pci 0000:00:01.0: vgaarb: setting as boot VGA device Mar 17 22:03:38.013276 kernel: pci 0000:00:01.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Mar 17 22:03:38.013437 kernel: pci 0000:00:01.0: vgaarb: bridge control possible Mar 17 22:03:38.013457 kernel: vgaarb: loaded Mar 17 22:03:38.013470 kernel: pps_core: LinuxPPS API ver. 1 registered Mar 17 22:03:38.013484 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Mar 17 22:03:38.013497 kernel: PTP clock support registered Mar 17 22:03:38.013510 kernel: PCI: Using ACPI for IRQ routing Mar 17 22:03:38.013523 kernel: PCI: pci_cache_line_size set to 64 bytes Mar 17 22:03:38.013536 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] Mar 17 22:03:38.013554 kernel: e820: reserve RAM buffer [mem 0x7ffdc000-0x7fffffff] Mar 17 22:03:38.013567 kernel: clocksource: Switched to clocksource kvm-clock Mar 17 22:03:38.013580 kernel: VFS: Disk quotas dquot_6.6.0 Mar 17 22:03:38.013594 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Mar 17 22:03:38.013606 kernel: pnp: PnP ACPI init Mar 17 22:03:38.013819 kernel: system 00:04: [mem 0xb0000000-0xbfffffff window] has been reserved Mar 17 22:03:38.013841 kernel: pnp: PnP ACPI: found 5 devices Mar 17 22:03:38.013854 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Mar 17 22:03:38.013873 kernel: NET: Registered PF_INET protocol family Mar 17 22:03:38.013886 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) Mar 17 22:03:38.013899 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) Mar 17 22:03:38.013912 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Mar 17 22:03:38.013925 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) Mar 17 22:03:38.013938 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear) Mar 17 22:03:38.013951 kernel: TCP: Hash tables configured (established 16384 bind 16384) Mar 17 22:03:38.013965 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) Mar 17 22:03:38.013978 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) Mar 17 22:03:38.013995 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Mar 17 22:03:38.014008 kernel: NET: Registered PF_XDP protocol family Mar 17 22:03:38.014195 kernel: pci 0000:00:02.0: bridge window [io 0x1000-0x0fff] to [bus 01-02] add_size 1000 Mar 17 22:03:38.014355 kernel: pci 0000:00:02.1: bridge window [io 0x1000-0x0fff] to [bus 03] add_size 1000 Mar 17 22:03:38.014515 kernel: pci 0000:00:02.2: bridge window [io 0x1000-0x0fff] to [bus 04] add_size 1000 Mar 17 22:03:38.014675 kernel: pci 0000:00:02.3: bridge window [io 0x1000-0x0fff] to [bus 05] add_size 1000 Mar 17 22:03:38.014834 kernel: pci 0000:00:02.4: bridge window [io 0x1000-0x0fff] to [bus 06] add_size 1000 Mar 17 22:03:38.014997 kernel: pci 0000:00:02.5: bridge window [io 0x1000-0x0fff] to [bus 07] add_size 1000 Mar 17 22:03:38.015181 kernel: pci 0000:00:02.6: bridge window [io 0x1000-0x0fff] to [bus 08] add_size 1000 Mar 17 22:03:38.015336 kernel: pci 0000:00:02.7: bridge window [io 0x1000-0x0fff] to [bus 09] add_size 1000 Mar 17 22:03:38.015493 kernel: pci 0000:00:02.0: BAR 13: assigned [io 0x1000-0x1fff] Mar 17 22:03:38.015651 kernel: pci 0000:00:02.1: BAR 13: assigned [io 0x2000-0x2fff] Mar 17 22:03:38.015808 kernel: pci 0000:00:02.2: BAR 13: assigned [io 0x3000-0x3fff] Mar 17 22:03:38.015969 kernel: pci 0000:00:02.3: BAR 13: assigned [io 0x4000-0x4fff] Mar 17 22:03:38.016154 kernel: pci 0000:00:02.4: BAR 13: assigned [io 0x5000-0x5fff] Mar 17 22:03:38.016314 kernel: pci 0000:00:02.5: BAR 13: assigned [io 0x6000-0x6fff] Mar 17 22:03:38.016470 kernel: pci 0000:00:02.6: BAR 13: assigned [io 0x7000-0x7fff] Mar 17 22:03:38.016627 kernel: pci 0000:00:02.7: BAR 13: assigned [io 0x8000-0x8fff] Mar 17 22:03:38.016793 kernel: pci 0000:01:00.0: PCI bridge to [bus 02] Mar 17 22:03:38.016957 kernel: pci 0000:01:00.0: bridge window [mem 0xfd800000-0xfd9fffff] Mar 17 22:03:38.021259 kernel: pci 0000:00:02.0: PCI bridge to [bus 01-02] Mar 17 22:03:38.021474 kernel: pci 0000:00:02.0: bridge window [io 0x1000-0x1fff] Mar 17 22:03:38.021651 kernel: pci 0000:00:02.0: bridge window [mem 0xfd800000-0xfdbfffff] Mar 17 22:03:38.021823 kernel: pci 0000:00:02.0: bridge window [mem 0xfce00000-0xfcffffff 64bit pref] Mar 17 22:03:38.022016 kernel: pci 0000:00:02.1: PCI bridge to [bus 03] Mar 17 22:03:38.022230 kernel: pci 0000:00:02.1: bridge window [io 0x2000-0x2fff] Mar 17 22:03:38.022389 kernel: pci 0000:00:02.1: bridge window [mem 0xfe800000-0xfe9fffff] Mar 17 22:03:38.022543 kernel: pci 0000:00:02.1: bridge window [mem 0xfcc00000-0xfcdfffff 64bit pref] Mar 17 22:03:38.022702 kernel: pci 0000:00:02.2: PCI bridge to [bus 04] Mar 17 22:03:38.022862 kernel: pci 0000:00:02.2: bridge window [io 0x3000-0x3fff] Mar 17 22:03:38.023030 kernel: pci 0000:00:02.2: bridge window [mem 0xfe600000-0xfe7fffff] Mar 17 22:03:38.023218 kernel: pci 0000:00:02.2: bridge window [mem 0xfca00000-0xfcbfffff 64bit pref] Mar 17 22:03:38.023381 kernel: pci 0000:00:02.3: PCI bridge to [bus 05] Mar 17 22:03:38.023564 kernel: pci 0000:00:02.3: bridge window [io 0x4000-0x4fff] Mar 17 22:03:38.023719 kernel: pci 0000:00:02.3: bridge window [mem 0xfe400000-0xfe5fffff] Mar 17 22:03:38.023879 kernel: pci 0000:00:02.3: bridge window [mem 0xfc800000-0xfc9fffff 64bit pref] Mar 17 22:03:38.024044 kernel: pci 0000:00:02.4: PCI bridge to [bus 06] Mar 17 22:03:38.024236 kernel: pci 0000:00:02.4: bridge window [io 0x5000-0x5fff] Mar 17 22:03:38.024396 kernel: pci 0000:00:02.4: bridge window [mem 0xfe200000-0xfe3fffff] Mar 17 22:03:38.024554 kernel: pci 0000:00:02.4: bridge window [mem 0xfc600000-0xfc7fffff 64bit pref] Mar 17 22:03:38.024717 kernel: pci 0000:00:02.5: PCI bridge to [bus 07] Mar 17 22:03:38.024875 kernel: pci 0000:00:02.5: bridge window [io 0x6000-0x6fff] Mar 17 22:03:38.025029 kernel: pci 0000:00:02.5: bridge window [mem 0xfe000000-0xfe1fffff] Mar 17 22:03:38.034369 kernel: pci 0000:00:02.5: bridge window [mem 0xfc400000-0xfc5fffff 64bit pref] Mar 17 22:03:38.034575 kernel: pci 0000:00:02.6: PCI bridge to [bus 08] Mar 17 22:03:38.034749 kernel: pci 0000:00:02.6: bridge window [io 0x7000-0x7fff] Mar 17 22:03:38.034910 kernel: pci 0000:00:02.6: bridge window [mem 0xfde00000-0xfdffffff] Mar 17 22:03:38.035097 kernel: pci 0000:00:02.6: bridge window [mem 0xfc200000-0xfc3fffff 64bit pref] Mar 17 22:03:38.035265 kernel: pci 0000:00:02.7: PCI bridge to [bus 09] Mar 17 22:03:38.035424 kernel: pci 0000:00:02.7: bridge window [io 0x8000-0x8fff] Mar 17 22:03:38.035593 kernel: pci 0000:00:02.7: bridge window [mem 0xfdc00000-0xfddfffff] Mar 17 22:03:38.035750 kernel: pci 0000:00:02.7: bridge window [mem 0xfc000000-0xfc1fffff 64bit pref] Mar 17 22:03:38.035904 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Mar 17 22:03:38.036061 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Mar 17 22:03:38.036222 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Mar 17 22:03:38.036366 kernel: pci_bus 0000:00: resource 7 [mem 0x80000000-0xafffffff window] Mar 17 22:03:38.036508 kernel: pci_bus 0000:00: resource 8 [mem 0xc0000000-0xfebfffff window] Mar 17 22:03:38.036665 kernel: pci_bus 0000:00: resource 9 [mem 0x20c0000000-0x28bfffffff window] Mar 17 22:03:38.036860 kernel: pci_bus 0000:01: resource 0 [io 0x1000-0x1fff] Mar 17 22:03:38.037017 kernel: pci_bus 0000:01: resource 1 [mem 0xfd800000-0xfdbfffff] Mar 17 22:03:38.037208 kernel: pci_bus 0000:01: resource 2 [mem 0xfce00000-0xfcffffff 64bit pref] Mar 17 22:03:38.037391 kernel: pci_bus 0000:02: resource 1 [mem 0xfd800000-0xfd9fffff] Mar 17 22:03:38.037572 kernel: pci_bus 0000:03: resource 0 [io 0x2000-0x2fff] Mar 17 22:03:38.037737 kernel: pci_bus 0000:03: resource 1 [mem 0xfe800000-0xfe9fffff] Mar 17 22:03:38.037900 kernel: pci_bus 0000:03: resource 2 [mem 0xfcc00000-0xfcdfffff 64bit pref] Mar 17 22:03:38.038109 kernel: pci_bus 0000:04: resource 0 [io 0x3000-0x3fff] Mar 17 22:03:38.038262 kernel: pci_bus 0000:04: resource 1 [mem 0xfe600000-0xfe7fffff] Mar 17 22:03:38.038424 kernel: pci_bus 0000:04: resource 2 [mem 0xfca00000-0xfcbfffff 64bit pref] Mar 17 22:03:38.038617 kernel: pci_bus 0000:05: resource 0 [io 0x4000-0x4fff] Mar 17 22:03:38.038780 kernel: pci_bus 0000:05: resource 1 [mem 0xfe400000-0xfe5fffff] Mar 17 22:03:38.038944 kernel: pci_bus 0000:05: resource 2 [mem 0xfc800000-0xfc9fffff 64bit pref] Mar 17 22:03:38.039163 kernel: pci_bus 0000:06: resource 0 [io 0x5000-0x5fff] Mar 17 22:03:38.039336 kernel: pci_bus 0000:06: resource 1 [mem 0xfe200000-0xfe3fffff] Mar 17 22:03:38.039499 kernel: pci_bus 0000:06: resource 2 [mem 0xfc600000-0xfc7fffff 64bit pref] Mar 17 22:03:38.039688 kernel: pci_bus 0000:07: resource 0 [io 0x6000-0x6fff] Mar 17 22:03:38.039851 kernel: pci_bus 0000:07: resource 1 [mem 0xfe000000-0xfe1fffff] Mar 17 22:03:38.040015 kernel: pci_bus 0000:07: resource 2 [mem 0xfc400000-0xfc5fffff 64bit pref] Mar 17 22:03:38.040218 kernel: pci_bus 0000:08: resource 0 [io 0x7000-0x7fff] Mar 17 22:03:38.040391 kernel: pci_bus 0000:08: resource 1 [mem 0xfde00000-0xfdffffff] Mar 17 22:03:38.040555 kernel: pci_bus 0000:08: resource 2 [mem 0xfc200000-0xfc3fffff 64bit pref] Mar 17 22:03:38.040735 kernel: pci_bus 0000:09: resource 0 [io 0x8000-0x8fff] Mar 17 22:03:38.040898 kernel: pci_bus 0000:09: resource 1 [mem 0xfdc00000-0xfddfffff] Mar 17 22:03:38.041058 kernel: pci_bus 0000:09: resource 2 [mem 0xfc000000-0xfc1fffff 64bit pref] Mar 17 22:03:38.041089 kernel: ACPI: \_SB_.GSIG: Enabled at IRQ 22 Mar 17 22:03:38.041106 kernel: PCI: CLS 0 bytes, default 64 Mar 17 22:03:38.041120 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Mar 17 22:03:38.041141 kernel: software IO TLB: mapped [mem 0x0000000079800000-0x000000007d800000] (64MB) Mar 17 22:03:38.041155 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Mar 17 22:03:38.041169 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x240937b9988, max_idle_ns: 440795218083 ns Mar 17 22:03:38.041183 kernel: Initialise system trusted keyrings Mar 17 22:03:38.041197 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0 Mar 17 22:03:38.041211 kernel: Key type asymmetric registered Mar 17 22:03:38.041225 kernel: Asymmetric key parser 'x509' registered Mar 17 22:03:38.041238 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Mar 17 22:03:38.041252 kernel: io scheduler mq-deadline registered Mar 17 22:03:38.041270 kernel: io scheduler kyber registered Mar 17 22:03:38.041284 kernel: io scheduler bfq registered Mar 17 22:03:38.041456 kernel: pcieport 0000:00:02.0: PME: Signaling with IRQ 24 Mar 17 22:03:38.041629 kernel: pcieport 0000:00:02.0: AER: enabled with IRQ 24 Mar 17 22:03:38.041802 kernel: pcieport 0000:00:02.0: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Mar 17 22:03:38.041976 kernel: pcieport 0000:00:02.1: PME: Signaling with IRQ 25 Mar 17 22:03:38.042170 kernel: pcieport 0000:00:02.1: AER: enabled with IRQ 25 Mar 17 22:03:38.042349 kernel: pcieport 0000:00:02.1: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Mar 17 22:03:38.042523 kernel: pcieport 0000:00:02.2: PME: Signaling with IRQ 26 Mar 17 22:03:38.042681 kernel: pcieport 0000:00:02.2: AER: enabled with IRQ 26 Mar 17 22:03:38.042848 kernel: pcieport 0000:00:02.2: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Mar 17 22:03:38.043012 kernel: pcieport 0000:00:02.3: PME: Signaling with IRQ 27 Mar 17 22:03:38.047343 kernel: pcieport 0000:00:02.3: AER: enabled with IRQ 27 Mar 17 22:03:38.047519 kernel: pcieport 0000:00:02.3: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Mar 17 22:03:38.047683 kernel: pcieport 0000:00:02.4: PME: Signaling with IRQ 28 Mar 17 22:03:38.047840 kernel: pcieport 0000:00:02.4: AER: enabled with IRQ 28 Mar 17 22:03:38.047996 kernel: pcieport 0000:00:02.4: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Mar 17 22:03:38.048199 kernel: pcieport 0000:00:02.5: PME: Signaling with IRQ 29 Mar 17 22:03:38.048355 kernel: pcieport 0000:00:02.5: AER: enabled with IRQ 29 Mar 17 22:03:38.048516 kernel: pcieport 0000:00:02.5: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Mar 17 22:03:38.048675 kernel: pcieport 0000:00:02.6: PME: Signaling with IRQ 30 Mar 17 22:03:38.048828 kernel: pcieport 0000:00:02.6: AER: enabled with IRQ 30 Mar 17 22:03:38.048989 kernel: pcieport 0000:00:02.6: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Mar 17 22:03:38.049175 kernel: pcieport 0000:00:02.7: PME: Signaling with IRQ 31 Mar 17 22:03:38.049332 kernel: pcieport 0000:00:02.7: AER: enabled with IRQ 31 Mar 17 22:03:38.049492 kernel: pcieport 0000:00:02.7: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Mar 17 22:03:38.049514 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Mar 17 22:03:38.049529 kernel: ACPI: \_SB_.GSIH: Enabled at IRQ 23 Mar 17 22:03:38.049543 kernel: ACPI: \_SB_.GSIE: Enabled at IRQ 20 Mar 17 22:03:38.049556 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Mar 17 22:03:38.049570 kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Mar 17 22:03:38.049585 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Mar 17 22:03:38.049598 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Mar 17 22:03:38.049618 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Mar 17 22:03:38.049632 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Mar 17 22:03:38.049804 kernel: rtc_cmos 00:03: RTC can wake from S4 Mar 17 22:03:38.049956 kernel: rtc_cmos 00:03: registered as rtc0 Mar 17 22:03:38.052633 kernel: rtc_cmos 00:03: setting system clock to 2025-03-17T22:03:37 UTC (1742249017) Mar 17 22:03:38.052793 kernel: rtc_cmos 00:03: alarms up to one day, y3k, 242 bytes nvram Mar 17 22:03:38.052815 kernel: intel_pstate: CPU model not supported Mar 17 22:03:38.052838 kernel: NET: Registered PF_INET6 protocol family Mar 17 22:03:38.052852 kernel: Segment Routing with IPv6 Mar 17 22:03:38.052866 kernel: In-situ OAM (IOAM) with IPv6 Mar 17 22:03:38.052879 kernel: NET: Registered PF_PACKET protocol family Mar 17 22:03:38.052892 kernel: Key type dns_resolver registered Mar 17 22:03:38.052906 kernel: IPI shorthand broadcast: enabled Mar 17 22:03:38.052920 kernel: sched_clock: Marking stable (996002540, 229609903)->(1525184732, -299572289) Mar 17 22:03:38.052934 kernel: registered taskstats version 1 Mar 17 22:03:38.052947 kernel: Loading compiled-in X.509 certificates Mar 17 22:03:38.052961 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.179-flatcar: d5b956bbabb2d386c0246a969032c0de9eaa8220' Mar 17 22:03:38.052978 kernel: Key type .fscrypt registered Mar 17 22:03:38.052992 kernel: Key type fscrypt-provisioning registered Mar 17 22:03:38.053005 kernel: ima: No TPM chip found, activating TPM-bypass! Mar 17 22:03:38.053019 kernel: ima: Allocated hash algorithm: sha1 Mar 17 22:03:38.053033 kernel: ima: No architecture policies found Mar 17 22:03:38.053058 kernel: clk: Disabling unused clocks Mar 17 22:03:38.053074 kernel: Freeing unused kernel image (initmem) memory: 47472K Mar 17 22:03:38.053100 kernel: Write protecting the kernel read-only data: 28672k Mar 17 22:03:38.053120 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Mar 17 22:03:38.053134 kernel: Freeing unused kernel image (rodata/data gap) memory: 612K Mar 17 22:03:38.053148 kernel: Run /init as init process Mar 17 22:03:38.053162 kernel: with arguments: Mar 17 22:03:38.053175 kernel: /init Mar 17 22:03:38.053189 kernel: with environment: Mar 17 22:03:38.053202 kernel: HOME=/ Mar 17 22:03:38.053215 kernel: TERM=linux Mar 17 22:03:38.053228 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Mar 17 22:03:38.053253 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Mar 17 22:03:38.053279 systemd[1]: Detected virtualization kvm. Mar 17 22:03:38.053294 systemd[1]: Detected architecture x86-64. Mar 17 22:03:38.053307 systemd[1]: Running in initrd. Mar 17 22:03:38.053321 systemd[1]: No hostname configured, using default hostname. Mar 17 22:03:38.053335 systemd[1]: Hostname set to . Mar 17 22:03:38.053350 systemd[1]: Initializing machine ID from VM UUID. Mar 17 22:03:38.053369 systemd[1]: Queued start job for default target initrd.target. Mar 17 22:03:38.053383 systemd[1]: Started systemd-ask-password-console.path. Mar 17 22:03:38.053398 systemd[1]: Reached target cryptsetup.target. Mar 17 22:03:38.053412 systemd[1]: Reached target paths.target. Mar 17 22:03:38.053425 systemd[1]: Reached target slices.target. Mar 17 22:03:38.053440 systemd[1]: Reached target swap.target. Mar 17 22:03:38.053454 systemd[1]: Reached target timers.target. Mar 17 22:03:38.053469 systemd[1]: Listening on iscsid.socket. Mar 17 22:03:38.053488 systemd[1]: Listening on iscsiuio.socket. Mar 17 22:03:38.053502 systemd[1]: Listening on systemd-journald-audit.socket. Mar 17 22:03:38.053522 systemd[1]: Listening on systemd-journald-dev-log.socket. Mar 17 22:03:38.053536 systemd[1]: Listening on systemd-journald.socket. Mar 17 22:03:38.053550 systemd[1]: Listening on systemd-networkd.socket. Mar 17 22:03:38.053564 systemd[1]: Listening on systemd-udevd-control.socket. Mar 17 22:03:38.053579 systemd[1]: Listening on systemd-udevd-kernel.socket. Mar 17 22:03:38.053597 systemd[1]: Reached target sockets.target. Mar 17 22:03:38.053611 systemd[1]: Starting kmod-static-nodes.service... Mar 17 22:03:38.053630 systemd[1]: Finished network-cleanup.service. Mar 17 22:03:38.053644 systemd[1]: Starting systemd-fsck-usr.service... Mar 17 22:03:38.053659 systemd[1]: Starting systemd-journald.service... Mar 17 22:03:38.053673 systemd[1]: Starting systemd-modules-load.service... Mar 17 22:03:38.053688 systemd[1]: Starting systemd-resolved.service... Mar 17 22:03:38.053702 systemd[1]: Starting systemd-vconsole-setup.service... Mar 17 22:03:38.053716 systemd[1]: Finished kmod-static-nodes.service. Mar 17 22:03:38.053730 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Mar 17 22:03:38.053759 systemd-journald[201]: Journal started Mar 17 22:03:38.053848 systemd-journald[201]: Runtime Journal (/run/log/journal/747dab5de6bb4fb2b534417b0659d3e8) is 4.7M, max 38.1M, 33.3M free. Mar 17 22:03:37.974570 systemd-modules-load[202]: Inserted module 'overlay' Mar 17 22:03:38.072709 kernel: Bridge firewalling registered Mar 17 22:03:38.023599 systemd-resolved[203]: Positive Trust Anchors: Mar 17 22:03:38.086726 systemd[1]: Started systemd-resolved.service. Mar 17 22:03:38.086772 kernel: audit: type=1130 audit(1742249018.073:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:38.086811 kernel: audit: type=1130 audit(1742249018.080:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:38.086831 systemd[1]: Started systemd-journald.service. Mar 17 22:03:38.073000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:38.080000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:38.023631 systemd-resolved[203]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Mar 17 22:03:38.088000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:38.023678 systemd-resolved[203]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Mar 17 22:03:38.098578 kernel: audit: type=1130 audit(1742249018.088:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:38.098610 kernel: SCSI subsystem initialized Mar 17 22:03:38.098629 kernel: audit: type=1130 audit(1742249018.098:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:38.098000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:38.036944 systemd-resolved[203]: Defaulting to hostname 'linux'. Mar 17 22:03:38.112368 kernel: audit: type=1130 audit(1742249018.103:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:38.103000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:38.060334 systemd-modules-load[202]: Inserted module 'br_netfilter' Mar 17 22:03:38.089446 systemd[1]: Finished systemd-fsck-usr.service. Mar 17 22:03:38.098513 systemd[1]: Finished systemd-vconsole-setup.service. Mar 17 22:03:38.127791 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Mar 17 22:03:38.127830 kernel: device-mapper: uevent: version 1.0.3 Mar 17 22:03:38.127849 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Mar 17 22:03:38.104146 systemd[1]: Reached target nss-lookup.target. Mar 17 22:03:38.105957 systemd[1]: Starting dracut-cmdline-ask.service... Mar 17 22:03:38.112856 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Mar 17 22:03:38.130790 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Mar 17 22:03:38.137972 kernel: audit: type=1130 audit(1742249018.132:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:38.132000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:38.131132 systemd-modules-load[202]: Inserted module 'dm_multipath' Mar 17 22:03:38.144313 kernel: audit: type=1130 audit(1742249018.138:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:38.138000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:38.132888 systemd[1]: Finished systemd-modules-load.service. Mar 17 22:03:38.144726 systemd[1]: Starting systemd-sysctl.service... Mar 17 22:03:38.153933 systemd[1]: Finished dracut-cmdline-ask.service. Mar 17 22:03:38.160431 kernel: audit: type=1130 audit(1742249018.154:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:38.154000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:38.160709 systemd[1]: Starting dracut-cmdline.service... Mar 17 22:03:38.161658 systemd[1]: Finished systemd-sysctl.service. Mar 17 22:03:38.182072 kernel: audit: type=1130 audit(1742249018.162:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:38.162000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:38.182431 dracut-cmdline[225]: dracut-dracut-053 Mar 17 22:03:38.182431 dracut-cmdline[225]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=249ccd113f901380672c0d31e18f792e8e0344094c0e39eedc449f039418b31a Mar 17 22:03:38.262152 kernel: Loading iSCSI transport class v2.0-870. Mar 17 22:03:38.283142 kernel: iscsi: registered transport (tcp) Mar 17 22:03:38.312147 kernel: iscsi: registered transport (qla4xxx) Mar 17 22:03:38.312263 kernel: QLogic iSCSI HBA Driver Mar 17 22:03:38.364421 systemd[1]: Finished dracut-cmdline.service. Mar 17 22:03:38.365000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:38.366627 systemd[1]: Starting dracut-pre-udev.service... Mar 17 22:03:38.428192 kernel: raid6: sse2x4 gen() 7763 MB/s Mar 17 22:03:38.446154 kernel: raid6: sse2x4 xor() 5055 MB/s Mar 17 22:03:38.464176 kernel: raid6: sse2x2 gen() 5573 MB/s Mar 17 22:03:38.482140 kernel: raid6: sse2x2 xor() 8028 MB/s Mar 17 22:03:38.500152 kernel: raid6: sse2x1 gen() 5526 MB/s Mar 17 22:03:38.518795 kernel: raid6: sse2x1 xor() 7183 MB/s Mar 17 22:03:38.518915 kernel: raid6: using algorithm sse2x4 gen() 7763 MB/s Mar 17 22:03:38.518934 kernel: raid6: .... xor() 5055 MB/s, rmw enabled Mar 17 22:03:38.520127 kernel: raid6: using ssse3x2 recovery algorithm Mar 17 22:03:38.537125 kernel: xor: automatically using best checksumming function avx Mar 17 22:03:38.655127 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Mar 17 22:03:38.668558 systemd[1]: Finished dracut-pre-udev.service. Mar 17 22:03:38.669000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:38.669000 audit: BPF prog-id=7 op=LOAD Mar 17 22:03:38.669000 audit: BPF prog-id=8 op=LOAD Mar 17 22:03:38.670698 systemd[1]: Starting systemd-udevd.service... Mar 17 22:03:38.690291 systemd-udevd[403]: Using default interface naming scheme 'v252'. Mar 17 22:03:38.702164 systemd[1]: Started systemd-udevd.service. Mar 17 22:03:38.704000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:38.706366 systemd[1]: Starting dracut-pre-trigger.service... Mar 17 22:03:38.726593 dracut-pre-trigger[407]: rd.md=0: removing MD RAID activation Mar 17 22:03:38.770388 systemd[1]: Finished dracut-pre-trigger.service. Mar 17 22:03:38.771000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:38.772378 systemd[1]: Starting systemd-udev-trigger.service... Mar 17 22:03:38.867000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:38.866477 systemd[1]: Finished systemd-udev-trigger.service. Mar 17 22:03:38.958120 kernel: virtio_blk virtio1: [vda] 125829120 512-byte logical blocks (64.4 GB/60.0 GiB) Mar 17 22:03:39.005938 kernel: cryptd: max_cpu_qlen set to 1000 Mar 17 22:03:39.005969 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Mar 17 22:03:39.005994 kernel: GPT:17805311 != 125829119 Mar 17 22:03:39.006022 kernel: GPT:Alternate GPT header not at the end of the disk. Mar 17 22:03:39.006052 kernel: GPT:17805311 != 125829119 Mar 17 22:03:39.006070 kernel: GPT: Use GNU Parted to correct GPT errors. Mar 17 22:03:39.006130 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Mar 17 22:03:39.011599 kernel: AVX version of gcm_enc/dec engaged. Mar 17 22:03:39.011652 kernel: AES CTR mode by8 optimization enabled Mar 17 22:03:39.052119 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (458) Mar 17 22:03:39.060181 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Mar 17 22:03:39.177013 kernel: ACPI: bus type USB registered Mar 17 22:03:39.177124 kernel: usbcore: registered new interface driver usbfs Mar 17 22:03:39.177144 kernel: usbcore: registered new interface driver hub Mar 17 22:03:39.177161 kernel: usbcore: registered new device driver usb Mar 17 22:03:39.177178 kernel: libata version 3.00 loaded. Mar 17 22:03:39.177195 kernel: ahci 0000:00:1f.2: version 3.0 Mar 17 22:03:39.177506 kernel: ACPI: \_SB_.GSIA: Enabled at IRQ 16 Mar 17 22:03:39.177527 kernel: ahci 0000:00:1f.2: AHCI 0001.0000 32 slots 6 ports 1.5 Gbps 0x3f impl SATA mode Mar 17 22:03:39.177719 kernel: ahci 0000:00:1f.2: flags: 64bit ncq only Mar 17 22:03:39.177892 kernel: scsi host0: ahci Mar 17 22:03:39.178135 kernel: scsi host1: ahci Mar 17 22:03:39.178331 kernel: scsi host2: ahci Mar 17 22:03:39.178519 kernel: scsi host3: ahci Mar 17 22:03:39.178745 kernel: scsi host4: ahci Mar 17 22:03:39.178936 kernel: scsi host5: ahci Mar 17 22:03:39.179167 kernel: ata1: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b100 irq 38 Mar 17 22:03:39.179187 kernel: ata2: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b180 irq 38 Mar 17 22:03:39.179205 kernel: ata3: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b200 irq 38 Mar 17 22:03:39.179223 kernel: ata4: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b280 irq 38 Mar 17 22:03:39.179240 kernel: ata5: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b300 irq 38 Mar 17 22:03:39.179258 kernel: ata6: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b380 irq 38 Mar 17 22:03:39.177971 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Mar 17 22:03:39.183674 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Mar 17 22:03:39.189478 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Mar 17 22:03:39.195484 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Mar 17 22:03:39.198195 systemd[1]: Starting disk-uuid.service... Mar 17 22:03:39.206260 disk-uuid[529]: Primary Header is updated. Mar 17 22:03:39.206260 disk-uuid[529]: Secondary Entries is updated. Mar 17 22:03:39.206260 disk-uuid[529]: Secondary Header is updated. Mar 17 22:03:39.211122 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Mar 17 22:03:39.427430 kernel: ata2: SATA link down (SStatus 0 SControl 300) Mar 17 22:03:39.427528 kernel: ata3: SATA link down (SStatus 0 SControl 300) Mar 17 22:03:39.429301 kernel: ata1: SATA link down (SStatus 0 SControl 300) Mar 17 22:03:39.438015 kernel: ata4: SATA link down (SStatus 0 SControl 300) Mar 17 22:03:39.438182 kernel: ata5: SATA link down (SStatus 0 SControl 300) Mar 17 22:03:39.438218 kernel: ata6: SATA link down (SStatus 0 SControl 300) Mar 17 22:03:39.453643 kernel: xhci_hcd 0000:03:00.0: xHCI Host Controller Mar 17 22:03:39.472789 kernel: xhci_hcd 0000:03:00.0: new USB bus registered, assigned bus number 1 Mar 17 22:03:39.473187 kernel: xhci_hcd 0000:03:00.0: hcc params 0x00087001 hci version 0x100 quirks 0x0000000000000010 Mar 17 22:03:39.473389 kernel: xhci_hcd 0000:03:00.0: xHCI Host Controller Mar 17 22:03:39.473584 kernel: xhci_hcd 0000:03:00.0: new USB bus registered, assigned bus number 2 Mar 17 22:03:39.473765 kernel: xhci_hcd 0000:03:00.0: Host supports USB 3.0 SuperSpeed Mar 17 22:03:39.473943 kernel: hub 1-0:1.0: USB hub found Mar 17 22:03:39.474251 kernel: hub 1-0:1.0: 4 ports detected Mar 17 22:03:39.474452 kernel: usb usb2: We don't know the algorithms for LPM for this host, disabling LPM. Mar 17 22:03:39.474700 kernel: hub 2-0:1.0: USB hub found Mar 17 22:03:39.474929 kernel: hub 2-0:1.0: 4 ports detected Mar 17 22:03:39.710211 kernel: usb 1-1: new high-speed USB device number 2 using xhci_hcd Mar 17 22:03:39.852368 kernel: hid: raw HID events driver (C) Jiri Kosina Mar 17 22:03:39.860798 kernel: usbcore: registered new interface driver usbhid Mar 17 22:03:39.860863 kernel: usbhid: USB HID core driver Mar 17 22:03:39.871623 kernel: input: QEMU QEMU USB Tablet as /devices/pci0000:00/0000:00:02.1/0000:03:00.0/usb1/1-1/1-1:1.0/0003:0627:0001.0001/input/input2 Mar 17 22:03:39.871701 kernel: hid-generic 0003:0627:0001.0001: input,hidraw0: USB HID v0.01 Mouse [QEMU QEMU USB Tablet] on usb-0000:03:00.0-1/input0 Mar 17 22:03:40.232106 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Mar 17 22:03:40.232888 disk-uuid[530]: The operation has completed successfully. Mar 17 22:03:40.292146 systemd[1]: disk-uuid.service: Deactivated successfully. Mar 17 22:03:40.293363 systemd[1]: Finished disk-uuid.service. Mar 17 22:03:40.294000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:40.294000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:40.301143 systemd[1]: Starting verity-setup.service... Mar 17 22:03:40.321132 kernel: device-mapper: verity: sha256 using implementation "sha256-avx" Mar 17 22:03:40.387531 systemd[1]: Found device dev-mapper-usr.device. Mar 17 22:03:40.389503 systemd[1]: Mounting sysusr-usr.mount... Mar 17 22:03:40.391243 systemd[1]: Finished verity-setup.service. Mar 17 22:03:40.391000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:40.488127 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Mar 17 22:03:40.489417 systemd[1]: Mounted sysusr-usr.mount. Mar 17 22:03:40.490283 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Mar 17 22:03:40.491337 systemd[1]: Starting ignition-setup.service... Mar 17 22:03:40.494826 systemd[1]: Starting parse-ip-for-networkd.service... Mar 17 22:03:40.513250 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Mar 17 22:03:40.513332 kernel: BTRFS info (device vda6): using free space tree Mar 17 22:03:40.513353 kernel: BTRFS info (device vda6): has skinny extents Mar 17 22:03:40.532577 systemd[1]: mnt-oem.mount: Deactivated successfully. Mar 17 22:03:40.542966 systemd[1]: Finished ignition-setup.service. Mar 17 22:03:40.543000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:40.544935 systemd[1]: Starting ignition-fetch-offline.service... Mar 17 22:03:40.645012 systemd[1]: Finished parse-ip-for-networkd.service. Mar 17 22:03:40.645000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:40.647000 audit: BPF prog-id=9 op=LOAD Mar 17 22:03:40.648207 systemd[1]: Starting systemd-networkd.service... Mar 17 22:03:40.681218 systemd-networkd[713]: lo: Link UP Mar 17 22:03:40.681233 systemd-networkd[713]: lo: Gained carrier Mar 17 22:03:40.682254 systemd-networkd[713]: Enumeration completed Mar 17 22:03:40.682642 systemd-networkd[713]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Mar 17 22:03:40.686000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:40.684621 systemd-networkd[713]: eth0: Link UP Mar 17 22:03:40.684627 systemd-networkd[713]: eth0: Gained carrier Mar 17 22:03:40.707000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:40.685397 systemd[1]: Started systemd-networkd.service. Mar 17 22:03:40.687022 systemd[1]: Reached target network.target. Mar 17 22:03:40.689146 systemd[1]: Starting iscsiuio.service... Mar 17 22:03:40.705817 systemd[1]: Started iscsiuio.service. Mar 17 22:03:40.709351 systemd[1]: Starting iscsid.service... Mar 17 22:03:40.718119 iscsid[718]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Mar 17 22:03:40.718119 iscsid[718]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Mar 17 22:03:40.718119 iscsid[718]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Mar 17 22:03:40.718119 iscsid[718]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Mar 17 22:03:40.718119 iscsid[718]: If using hardware iscsi like qla4xxx this message can be ignored. Mar 17 22:03:40.718119 iscsid[718]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Mar 17 22:03:40.718119 iscsid[718]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Mar 17 22:03:40.721000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:40.719123 systemd[1]: Started iscsid.service. Mar 17 22:03:40.722810 systemd[1]: Starting dracut-initqueue.service... Mar 17 22:03:40.745000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:40.745192 systemd[1]: Finished dracut-initqueue.service. Mar 17 22:03:40.746050 systemd[1]: Reached target remote-fs-pre.target. Mar 17 22:03:40.746682 systemd[1]: Reached target remote-cryptsetup.target. Mar 17 22:03:40.747328 systemd[1]: Reached target remote-fs.target. Mar 17 22:03:40.748250 systemd-networkd[713]: eth0: DHCPv4 address 10.244.26.146/30, gateway 10.244.26.145 acquired from 10.244.26.145 Mar 17 22:03:40.753494 systemd[1]: Starting dracut-pre-mount.service... Mar 17 22:03:40.767726 systemd[1]: Finished dracut-pre-mount.service. Mar 17 22:03:40.768000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:40.772585 ignition[635]: Ignition 2.14.0 Mar 17 22:03:40.772612 ignition[635]: Stage: fetch-offline Mar 17 22:03:40.776000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:40.775859 systemd[1]: Finished ignition-fetch-offline.service. Mar 17 22:03:40.772745 ignition[635]: reading system config file "/usr/lib/ignition/base.d/base.ign" Mar 17 22:03:40.772793 ignition[635]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Mar 17 22:03:40.778407 systemd[1]: Starting ignition-fetch.service... Mar 17 22:03:40.774199 ignition[635]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Mar 17 22:03:40.774357 ignition[635]: parsed url from cmdline: "" Mar 17 22:03:40.774365 ignition[635]: no config URL provided Mar 17 22:03:40.774375 ignition[635]: reading system config file "/usr/lib/ignition/user.ign" Mar 17 22:03:40.774391 ignition[635]: no config at "/usr/lib/ignition/user.ign" Mar 17 22:03:40.774419 ignition[635]: failed to fetch config: resource requires networking Mar 17 22:03:40.774609 ignition[635]: Ignition finished successfully Mar 17 22:03:40.790101 ignition[732]: Ignition 2.14.0 Mar 17 22:03:40.790127 ignition[732]: Stage: fetch Mar 17 22:03:40.790325 ignition[732]: reading system config file "/usr/lib/ignition/base.d/base.ign" Mar 17 22:03:40.790362 ignition[732]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Mar 17 22:03:40.791739 ignition[732]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Mar 17 22:03:40.791893 ignition[732]: parsed url from cmdline: "" Mar 17 22:03:40.791900 ignition[732]: no config URL provided Mar 17 22:03:40.791910 ignition[732]: reading system config file "/usr/lib/ignition/user.ign" Mar 17 22:03:40.791926 ignition[732]: no config at "/usr/lib/ignition/user.ign" Mar 17 22:03:40.794963 ignition[732]: config drive ("/dev/disk/by-label/config-2") not found. Waiting... Mar 17 22:03:40.795023 ignition[732]: config drive ("/dev/disk/by-label/CONFIG-2") not found. Waiting... Mar 17 22:03:40.795197 ignition[732]: GET http://169.254.169.254/openstack/latest/user_data: attempt #1 Mar 17 22:03:40.818337 ignition[732]: GET result: OK Mar 17 22:03:40.818512 ignition[732]: parsing config with SHA512: aee1252d74c852e689a48dc68794c7f58a262e2c832338df1e16b99a9562d6470b17a27982c6f5d6dad3abd51b573c284377fc4eb99a45985103a10351bd9f49 Mar 17 22:03:40.837319 unknown[732]: fetched base config from "system" Mar 17 22:03:40.837998 ignition[732]: fetch: fetch complete Mar 17 22:03:40.837334 unknown[732]: fetched base config from "system" Mar 17 22:03:40.838019 ignition[732]: fetch: fetch passed Mar 17 22:03:40.837343 unknown[732]: fetched user config from "openstack" Mar 17 22:03:40.838099 ignition[732]: Ignition finished successfully Mar 17 22:03:40.840742 systemd[1]: Finished ignition-fetch.service. Mar 17 22:03:40.844000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:40.845708 systemd[1]: Starting ignition-kargs.service... Mar 17 22:03:40.859841 ignition[738]: Ignition 2.14.0 Mar 17 22:03:40.859870 ignition[738]: Stage: kargs Mar 17 22:03:40.860073 ignition[738]: reading system config file "/usr/lib/ignition/base.d/base.ign" Mar 17 22:03:40.860297 ignition[738]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Mar 17 22:03:40.861794 ignition[738]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Mar 17 22:03:40.863676 ignition[738]: kargs: kargs passed Mar 17 22:03:40.863765 ignition[738]: Ignition finished successfully Mar 17 22:03:40.865276 systemd[1]: Finished ignition-kargs.service. Mar 17 22:03:40.866000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:40.867546 systemd[1]: Starting ignition-disks.service... Mar 17 22:03:40.879381 ignition[743]: Ignition 2.14.0 Mar 17 22:03:40.879403 ignition[743]: Stage: disks Mar 17 22:03:40.879588 ignition[743]: reading system config file "/usr/lib/ignition/base.d/base.ign" Mar 17 22:03:40.879625 ignition[743]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Mar 17 22:03:40.880922 ignition[743]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Mar 17 22:03:40.882478 ignition[743]: disks: disks passed Mar 17 22:03:40.882576 ignition[743]: Ignition finished successfully Mar 17 22:03:40.884180 systemd[1]: Finished ignition-disks.service. Mar 17 22:03:40.885000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:40.886128 systemd[1]: Reached target initrd-root-device.target. Mar 17 22:03:40.887317 systemd[1]: Reached target local-fs-pre.target. Mar 17 22:03:40.888776 systemd[1]: Reached target local-fs.target. Mar 17 22:03:40.890124 systemd[1]: Reached target sysinit.target. Mar 17 22:03:40.891294 systemd[1]: Reached target basic.target. Mar 17 22:03:40.894385 systemd[1]: Starting systemd-fsck-root.service... Mar 17 22:03:40.915071 systemd-fsck[750]: ROOT: clean, 623/1628000 files, 124059/1617920 blocks Mar 17 22:03:40.919000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:40.918630 systemd[1]: Finished systemd-fsck-root.service. Mar 17 22:03:40.920648 systemd[1]: Mounting sysroot.mount... Mar 17 22:03:40.933114 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Mar 17 22:03:40.934252 systemd[1]: Mounted sysroot.mount. Mar 17 22:03:40.935867 systemd[1]: Reached target initrd-root-fs.target. Mar 17 22:03:40.939037 systemd[1]: Mounting sysroot-usr.mount... Mar 17 22:03:40.941180 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Mar 17 22:03:40.943339 systemd[1]: Starting flatcar-openstack-hostname.service... Mar 17 22:03:40.944995 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Mar 17 22:03:40.945913 systemd[1]: Reached target ignition-diskful.target. Mar 17 22:03:40.950557 systemd[1]: Mounted sysroot-usr.mount. Mar 17 22:03:40.954168 systemd[1]: Starting initrd-setup-root.service... Mar 17 22:03:40.963350 initrd-setup-root[761]: cut: /sysroot/etc/passwd: No such file or directory Mar 17 22:03:40.978570 initrd-setup-root[769]: cut: /sysroot/etc/group: No such file or directory Mar 17 22:03:40.989536 initrd-setup-root[777]: cut: /sysroot/etc/shadow: No such file or directory Mar 17 22:03:41.000714 initrd-setup-root[785]: cut: /sysroot/etc/gshadow: No such file or directory Mar 17 22:03:41.068312 systemd[1]: Finished initrd-setup-root.service. Mar 17 22:03:41.069000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:41.070720 systemd[1]: Starting ignition-mount.service... Mar 17 22:03:41.073862 systemd[1]: Starting sysroot-boot.service... Mar 17 22:03:41.085567 bash[804]: umount: /sysroot/usr/share/oem: not mounted. Mar 17 22:03:41.097823 ignition[805]: INFO : Ignition 2.14.0 Mar 17 22:03:41.099119 ignition[805]: INFO : Stage: mount Mar 17 22:03:41.100150 ignition[805]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Mar 17 22:03:41.101177 ignition[805]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Mar 17 22:03:41.111169 ignition[805]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" Mar 17 22:03:41.114414 ignition[805]: INFO : mount: mount passed Mar 17 22:03:41.115278 ignition[805]: INFO : Ignition finished successfully Mar 17 22:03:41.116964 systemd[1]: Finished ignition-mount.service. Mar 17 22:03:41.117000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:41.120519 coreos-metadata[756]: Mar 17 22:03:41.120 INFO Fetching http://169.254.169.254/latest/meta-data/hostname: Attempt #1 Mar 17 22:03:41.130351 systemd[1]: Finished sysroot-boot.service. Mar 17 22:03:41.131000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:41.139976 coreos-metadata[756]: Mar 17 22:03:41.139 INFO Fetch successful Mar 17 22:03:41.140958 coreos-metadata[756]: Mar 17 22:03:41.140 INFO wrote hostname srv-zbif7.gb1.brightbox.com to /sysroot/etc/hostname Mar 17 22:03:41.143560 systemd[1]: flatcar-openstack-hostname.service: Deactivated successfully. Mar 17 22:03:41.143716 systemd[1]: Finished flatcar-openstack-hostname.service. Mar 17 22:03:41.145000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-openstack-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:41.145000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-openstack-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:41.412316 systemd[1]: Mounting sysroot-usr-share-oem.mount... Mar 17 22:03:41.429124 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/vda6 scanned by mount (813) Mar 17 22:03:41.433178 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Mar 17 22:03:41.433233 kernel: BTRFS info (device vda6): using free space tree Mar 17 22:03:41.433264 kernel: BTRFS info (device vda6): has skinny extents Mar 17 22:03:41.440812 systemd[1]: Mounted sysroot-usr-share-oem.mount. Mar 17 22:03:41.443545 systemd[1]: Starting ignition-files.service... Mar 17 22:03:41.466319 ignition[833]: INFO : Ignition 2.14.0 Mar 17 22:03:41.466319 ignition[833]: INFO : Stage: files Mar 17 22:03:41.468390 ignition[833]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Mar 17 22:03:41.468390 ignition[833]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Mar 17 22:03:41.468390 ignition[833]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" Mar 17 22:03:41.471886 ignition[833]: DEBUG : files: compiled without relabeling support, skipping Mar 17 22:03:41.471886 ignition[833]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Mar 17 22:03:41.471886 ignition[833]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Mar 17 22:03:41.475596 ignition[833]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Mar 17 22:03:41.476810 ignition[833]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Mar 17 22:03:41.478023 ignition[833]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Mar 17 22:03:41.477161 unknown[833]: wrote ssh authorized keys file for user: core Mar 17 22:03:41.481255 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.17.0-linux-amd64.tar.gz" Mar 17 22:03:41.481255 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.17.0-linux-amd64.tar.gz: attempt #1 Mar 17 22:03:41.664490 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Mar 17 22:03:42.128561 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.17.0-linux-amd64.tar.gz" Mar 17 22:03:42.128561 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" Mar 17 22:03:42.130970 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" Mar 17 22:03:42.130970 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/nginx.yaml" Mar 17 22:03:42.130970 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/nginx.yaml" Mar 17 22:03:42.130970 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Mar 17 22:03:42.130970 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Mar 17 22:03:42.130970 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Mar 17 22:03:42.130970 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Mar 17 22:03:42.130970 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/flatcar/update.conf" Mar 17 22:03:42.130970 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/flatcar/update.conf" Mar 17 22:03:42.130970 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.32.0-x86-64.raw" Mar 17 22:03:42.130970 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.32.0-x86-64.raw" Mar 17 22:03:42.130970 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.32.0-x86-64.raw" Mar 17 22:03:42.130970 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.32.0-x86-64.raw: attempt #1 Mar 17 22:03:42.250856 systemd-networkd[713]: eth0: Gained IPv6LL Mar 17 22:03:42.733721 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET result: OK Mar 17 22:03:43.762309 systemd-networkd[713]: eth0: Ignoring DHCPv6 address 2a02:1348:17d:6a4:24:19ff:fef4:1a92/128 (valid for 59min 59s, preferred for 59min 59s) which conflicts with 2a02:1348:17d:6a4:24:19ff:fef4:1a92/64 assigned by NDisc. Mar 17 22:03:43.762334 systemd-networkd[713]: eth0: Hint: use IPv6Token= setting to change the address generated by NDisc or set UseAutonomousPrefix=no. Mar 17 22:03:44.032055 ignition[833]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.32.0-x86-64.raw" Mar 17 22:03:44.032055 ignition[833]: INFO : files: op(b): [started] processing unit "coreos-metadata-sshkeys@.service" Mar 17 22:03:44.032055 ignition[833]: INFO : files: op(b): [finished] processing unit "coreos-metadata-sshkeys@.service" Mar 17 22:03:44.032055 ignition[833]: INFO : files: op(c): [started] processing unit "prepare-helm.service" Mar 17 22:03:44.036823 ignition[833]: INFO : files: op(c): op(d): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Mar 17 22:03:44.036823 ignition[833]: INFO : files: op(c): op(d): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Mar 17 22:03:44.036823 ignition[833]: INFO : files: op(c): [finished] processing unit "prepare-helm.service" Mar 17 22:03:44.036823 ignition[833]: INFO : files: op(e): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Mar 17 22:03:44.036823 ignition[833]: INFO : files: op(e): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Mar 17 22:03:44.036823 ignition[833]: INFO : files: op(f): [started] setting preset to enabled for "prepare-helm.service" Mar 17 22:03:44.036823 ignition[833]: INFO : files: op(f): [finished] setting preset to enabled for "prepare-helm.service" Mar 17 22:03:44.045755 ignition[833]: INFO : files: createResultFile: createFiles: op(10): [started] writing file "/sysroot/etc/.ignition-result.json" Mar 17 22:03:44.045755 ignition[833]: INFO : files: createResultFile: createFiles: op(10): [finished] writing file "/sysroot/etc/.ignition-result.json" Mar 17 22:03:44.045755 ignition[833]: INFO : files: files passed Mar 17 22:03:44.045755 ignition[833]: INFO : Ignition finished successfully Mar 17 22:03:44.059911 kernel: kauditd_printk_skb: 28 callbacks suppressed Mar 17 22:03:44.059968 kernel: audit: type=1130 audit(1742249024.047:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:44.047000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:44.045637 systemd[1]: Finished ignition-files.service. Mar 17 22:03:44.050389 systemd[1]: Starting initrd-setup-root-after-ignition.service... Mar 17 22:03:44.058533 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Mar 17 22:03:44.059828 systemd[1]: Starting ignition-quench.service... Mar 17 22:03:44.065565 systemd[1]: ignition-quench.service: Deactivated successfully. Mar 17 22:03:44.065745 systemd[1]: Finished ignition-quench.service. Mar 17 22:03:44.079188 kernel: audit: type=1130 audit(1742249024.067:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:44.079230 kernel: audit: type=1131 audit(1742249024.067:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:44.067000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:44.067000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:44.080246 initrd-setup-root-after-ignition[858]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Mar 17 22:03:44.081744 systemd[1]: Finished initrd-setup-root-after-ignition.service. Mar 17 22:03:44.088289 kernel: audit: type=1130 audit(1742249024.082:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:44.082000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:44.082657 systemd[1]: Reached target ignition-complete.target. Mar 17 22:03:44.090125 systemd[1]: Starting initrd-parse-etc.service... Mar 17 22:03:44.113956 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Mar 17 22:03:44.114143 systemd[1]: Finished initrd-parse-etc.service. Mar 17 22:03:44.125883 kernel: audit: type=1130 audit(1742249024.115:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:44.125925 kernel: audit: type=1131 audit(1742249024.115:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:44.115000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:44.115000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:44.115764 systemd[1]: Reached target initrd-fs.target. Mar 17 22:03:44.126549 systemd[1]: Reached target initrd.target. Mar 17 22:03:44.127785 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Mar 17 22:03:44.129229 systemd[1]: Starting dracut-pre-pivot.service... Mar 17 22:03:44.147215 systemd[1]: Finished dracut-pre-pivot.service. Mar 17 22:03:44.153598 kernel: audit: type=1130 audit(1742249024.147:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:44.147000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:44.154120 systemd[1]: Starting initrd-cleanup.service... Mar 17 22:03:44.168767 systemd[1]: Stopped target nss-lookup.target. Mar 17 22:03:44.170497 systemd[1]: Stopped target remote-cryptsetup.target. Mar 17 22:03:44.172104 systemd[1]: Stopped target timers.target. Mar 17 22:03:44.187479 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Mar 17 22:03:44.187701 systemd[1]: Stopped dracut-pre-pivot.service. Mar 17 22:03:44.194215 kernel: audit: type=1131 audit(1742249024.189:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:44.189000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:44.189330 systemd[1]: Stopped target initrd.target. Mar 17 22:03:44.195107 systemd[1]: Stopped target basic.target. Mar 17 22:03:44.196292 systemd[1]: Stopped target ignition-complete.target. Mar 17 22:03:44.197591 systemd[1]: Stopped target ignition-diskful.target. Mar 17 22:03:44.198882 systemd[1]: Stopped target initrd-root-device.target. Mar 17 22:03:44.200295 systemd[1]: Stopped target remote-fs.target. Mar 17 22:03:44.201556 systemd[1]: Stopped target remote-fs-pre.target. Mar 17 22:03:44.203240 systemd[1]: Stopped target sysinit.target. Mar 17 22:03:44.204499 systemd[1]: Stopped target local-fs.target. Mar 17 22:03:44.207715 systemd[1]: Stopped target local-fs-pre.target. Mar 17 22:03:44.209125 systemd[1]: Stopped target swap.target. Mar 17 22:03:44.210331 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Mar 17 22:03:44.216933 kernel: audit: type=1131 audit(1742249024.211:47): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:44.211000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:44.210591 systemd[1]: Stopped dracut-pre-mount.service. Mar 17 22:03:44.211749 systemd[1]: Stopped target cryptsetup.target. Mar 17 22:03:44.224671 kernel: audit: type=1131 audit(1742249024.219:48): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:44.219000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:44.217795 systemd[1]: dracut-initqueue.service: Deactivated successfully. Mar 17 22:03:44.218137 systemd[1]: Stopped dracut-initqueue.service. Mar 17 22:03:44.219326 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Mar 17 22:03:44.219559 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Mar 17 22:03:44.228000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:44.229215 systemd[1]: ignition-files.service: Deactivated successfully. Mar 17 22:03:44.229474 systemd[1]: Stopped ignition-files.service. Mar 17 22:03:44.230000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:44.237615 iscsid[718]: iscsid shutting down. Mar 17 22:03:44.232324 systemd[1]: Stopping ignition-mount.service... Mar 17 22:03:44.237805 systemd[1]: Stopping iscsid.service... Mar 17 22:03:44.243520 systemd[1]: Stopping sysroot-boot.service... Mar 17 22:03:44.245348 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Mar 17 22:03:44.246962 systemd[1]: Stopped systemd-udev-trigger.service. Mar 17 22:03:44.248000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:44.249288 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Mar 17 22:03:44.250377 ignition[871]: INFO : Ignition 2.14.0 Mar 17 22:03:44.250377 ignition[871]: INFO : Stage: umount Mar 17 22:03:44.252121 systemd[1]: Stopped dracut-pre-trigger.service. Mar 17 22:03:44.253000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:44.254251 ignition[871]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Mar 17 22:03:44.255185 ignition[871]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Mar 17 22:03:44.259541 systemd[1]: iscsid.service: Deactivated successfully. Mar 17 22:03:44.260615 systemd[1]: Stopped iscsid.service. Mar 17 22:03:44.262000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:44.263929 systemd[1]: initrd-cleanup.service: Deactivated successfully. Mar 17 22:03:44.264759 ignition[871]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" Mar 17 22:03:44.265760 ignition[871]: INFO : umount: umount passed Mar 17 22:03:44.265760 ignition[871]: INFO : Ignition finished successfully Mar 17 22:03:44.267658 systemd[1]: Finished initrd-cleanup.service. Mar 17 22:03:44.269000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:44.270000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:44.272644 systemd[1]: sysroot-boot.mount: Deactivated successfully. Mar 17 22:03:44.274000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:44.273360 systemd[1]: ignition-mount.service: Deactivated successfully. Mar 17 22:03:44.273497 systemd[1]: Stopped ignition-mount.service. Mar 17 22:03:44.276000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:44.275480 systemd[1]: ignition-disks.service: Deactivated successfully. Mar 17 22:03:44.278000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:44.275563 systemd[1]: Stopped ignition-disks.service. Mar 17 22:03:44.279000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:44.276554 systemd[1]: ignition-kargs.service: Deactivated successfully. Mar 17 22:03:44.281000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:44.276615 systemd[1]: Stopped ignition-kargs.service. Mar 17 22:03:44.278230 systemd[1]: ignition-fetch.service: Deactivated successfully. Mar 17 22:03:44.278299 systemd[1]: Stopped ignition-fetch.service. Mar 17 22:03:44.279548 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Mar 17 22:03:44.279611 systemd[1]: Stopped ignition-fetch-offline.service. Mar 17 22:03:44.281589 systemd[1]: Stopped target paths.target. Mar 17 22:03:44.282246 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Mar 17 22:03:44.286182 systemd[1]: Stopped systemd-ask-password-console.path. Mar 17 22:03:44.291000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:44.286825 systemd[1]: Stopped target slices.target. Mar 17 22:03:44.287459 systemd[1]: Stopped target sockets.target. Mar 17 22:03:44.288815 systemd[1]: iscsid.socket: Deactivated successfully. Mar 17 22:03:44.297000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:44.288884 systemd[1]: Closed iscsid.socket. Mar 17 22:03:44.289965 systemd[1]: ignition-setup.service: Deactivated successfully. Mar 17 22:03:44.290040 systemd[1]: Stopped ignition-setup.service. Mar 17 22:03:44.293159 systemd[1]: Stopping iscsiuio.service... Mar 17 22:03:44.296433 systemd[1]: iscsiuio.service: Deactivated successfully. Mar 17 22:03:44.296588 systemd[1]: Stopped iscsiuio.service. Mar 17 22:03:44.297470 systemd[1]: Stopped target network.target. Mar 17 22:03:44.308000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:44.298662 systemd[1]: iscsiuio.socket: Deactivated successfully. Mar 17 22:03:44.298718 systemd[1]: Closed iscsiuio.socket. Mar 17 22:03:44.300219 systemd[1]: Stopping systemd-networkd.service... Mar 17 22:03:44.303283 systemd[1]: Stopping systemd-resolved.service... Mar 17 22:03:44.304169 systemd-networkd[713]: eth0: DHCPv6 lease lost Mar 17 22:03:44.315000 audit: BPF prog-id=9 op=UNLOAD Mar 17 22:03:44.315000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:44.305965 systemd[1]: systemd-networkd.service: Deactivated successfully. Mar 17 22:03:44.318000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:44.306157 systemd[1]: Stopped systemd-networkd.service. Mar 17 22:03:44.319000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:44.309172 systemd[1]: systemd-networkd.socket: Deactivated successfully. Mar 17 22:03:44.309228 systemd[1]: Closed systemd-networkd.socket. Mar 17 22:03:44.311353 systemd[1]: Stopping network-cleanup.service... Mar 17 22:03:44.314730 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Mar 17 22:03:44.314809 systemd[1]: Stopped parse-ip-for-networkd.service. Mar 17 22:03:44.316204 systemd[1]: systemd-sysctl.service: Deactivated successfully. Mar 17 22:03:44.316278 systemd[1]: Stopped systemd-sysctl.service. Mar 17 22:03:44.331000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:44.318824 systemd[1]: systemd-modules-load.service: Deactivated successfully. Mar 17 22:03:44.318901 systemd[1]: Stopped systemd-modules-load.service. Mar 17 22:03:44.334000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:44.325125 systemd[1]: Stopping systemd-udevd.service... Mar 17 22:03:44.327530 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Mar 17 22:03:44.328381 systemd[1]: systemd-resolved.service: Deactivated successfully. Mar 17 22:03:44.330165 systemd[1]: Stopped systemd-resolved.service. Mar 17 22:03:44.338000 audit: BPF prog-id=6 op=UNLOAD Mar 17 22:03:44.332529 systemd[1]: systemd-udevd.service: Deactivated successfully. Mar 17 22:03:44.332739 systemd[1]: Stopped systemd-udevd.service. Mar 17 22:03:44.336070 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Mar 17 22:03:44.336263 systemd[1]: Closed systemd-udevd-control.socket. Mar 17 22:03:44.342000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:44.338034 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Mar 17 22:03:44.343000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:44.338117 systemd[1]: Closed systemd-udevd-kernel.socket. Mar 17 22:03:44.345000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:44.341250 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Mar 17 22:03:44.341324 systemd[1]: Stopped dracut-pre-udev.service. Mar 17 22:03:44.342806 systemd[1]: dracut-cmdline.service: Deactivated successfully. Mar 17 22:03:44.343361 systemd[1]: Stopped dracut-cmdline.service. Mar 17 22:03:44.344060 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Mar 17 22:03:44.344144 systemd[1]: Stopped dracut-cmdline-ask.service. Mar 17 22:03:44.346571 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Mar 17 22:03:44.355793 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Mar 17 22:03:44.371000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:44.355898 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Mar 17 22:03:44.372174 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Mar 17 22:03:44.373000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:44.372273 systemd[1]: Stopped kmod-static-nodes.service. Mar 17 22:03:44.374000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:44.373587 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Mar 17 22:03:44.373649 systemd[1]: Stopped systemd-vconsole-setup.service. Mar 17 22:03:44.376428 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Mar 17 22:03:44.377226 systemd[1]: network-cleanup.service: Deactivated successfully. Mar 17 22:03:44.378000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:44.377368 systemd[1]: Stopped network-cleanup.service. Mar 17 22:03:44.380000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:44.380000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:44.379205 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Mar 17 22:03:44.379325 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Mar 17 22:03:44.411630 systemd[1]: sysroot-boot.service: Deactivated successfully. Mar 17 22:03:44.411788 systemd[1]: Stopped sysroot-boot.service. Mar 17 22:03:44.413000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:44.413465 systemd[1]: Reached target initrd-switch-root.target. Mar 17 22:03:44.414604 systemd[1]: initrd-setup-root.service: Deactivated successfully. Mar 17 22:03:44.415000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:44.414677 systemd[1]: Stopped initrd-setup-root.service. Mar 17 22:03:44.417159 systemd[1]: Starting initrd-switch-root.service... Mar 17 22:03:44.434381 systemd[1]: Switching root. Mar 17 22:03:44.458804 systemd-journald[201]: Journal stopped Mar 17 22:03:48.669878 systemd-journald[201]: Received SIGTERM from PID 1 (systemd). Mar 17 22:03:48.670004 kernel: SELinux: Class mctp_socket not defined in policy. Mar 17 22:03:48.670032 kernel: SELinux: Class anon_inode not defined in policy. Mar 17 22:03:48.670052 kernel: SELinux: the above unknown classes and permissions will be allowed Mar 17 22:03:48.670120 kernel: SELinux: policy capability network_peer_controls=1 Mar 17 22:03:48.670144 kernel: SELinux: policy capability open_perms=1 Mar 17 22:03:48.670165 kernel: SELinux: policy capability extended_socket_class=1 Mar 17 22:03:48.670194 kernel: SELinux: policy capability always_check_network=0 Mar 17 22:03:48.670214 kernel: SELinux: policy capability cgroup_seclabel=1 Mar 17 22:03:48.670235 kernel: SELinux: policy capability nnp_nosuid_transition=1 Mar 17 22:03:48.670254 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Mar 17 22:03:48.670279 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Mar 17 22:03:48.670301 systemd[1]: Successfully loaded SELinux policy in 70.567ms. Mar 17 22:03:48.670393 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 16.955ms. Mar 17 22:03:48.670421 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Mar 17 22:03:48.670444 systemd[1]: Detected virtualization kvm. Mar 17 22:03:48.670464 systemd[1]: Detected architecture x86-64. Mar 17 22:03:48.670484 systemd[1]: Detected first boot. Mar 17 22:03:48.670512 systemd[1]: Hostname set to . Mar 17 22:03:48.670534 systemd[1]: Initializing machine ID from VM UUID. Mar 17 22:03:48.670568 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Mar 17 22:03:48.670598 systemd[1]: Populated /etc with preset unit settings. Mar 17 22:03:48.670620 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Mar 17 22:03:48.670643 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Mar 17 22:03:48.670697 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Mar 17 22:03:48.670721 systemd[1]: initrd-switch-root.service: Deactivated successfully. Mar 17 22:03:48.670747 systemd[1]: Stopped initrd-switch-root.service. Mar 17 22:03:48.670785 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Mar 17 22:03:48.670818 systemd[1]: Created slice system-addon\x2dconfig.slice. Mar 17 22:03:48.670840 systemd[1]: Created slice system-addon\x2drun.slice. Mar 17 22:03:48.670884 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Mar 17 22:03:48.670907 systemd[1]: Created slice system-getty.slice. Mar 17 22:03:48.670935 systemd[1]: Created slice system-modprobe.slice. Mar 17 22:03:48.670956 systemd[1]: Created slice system-serial\x2dgetty.slice. Mar 17 22:03:48.670976 systemd[1]: Created slice system-system\x2dcloudinit.slice. Mar 17 22:03:48.671013 systemd[1]: Created slice system-systemd\x2dfsck.slice. Mar 17 22:03:48.671036 systemd[1]: Created slice user.slice. Mar 17 22:03:48.671056 systemd[1]: Started systemd-ask-password-console.path. Mar 17 22:03:48.671076 systemd[1]: Started systemd-ask-password-wall.path. Mar 17 22:03:48.671113 systemd[1]: Set up automount boot.automount. Mar 17 22:03:48.671135 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Mar 17 22:03:48.671592 systemd[1]: Stopped target initrd-switch-root.target. Mar 17 22:03:48.671648 systemd[1]: Stopped target initrd-fs.target. Mar 17 22:03:48.671672 systemd[1]: Stopped target initrd-root-fs.target. Mar 17 22:03:48.671700 systemd[1]: Reached target integritysetup.target. Mar 17 22:03:48.671738 systemd[1]: Reached target remote-cryptsetup.target. Mar 17 22:03:48.671769 systemd[1]: Reached target remote-fs.target. Mar 17 22:03:48.671791 systemd[1]: Reached target slices.target. Mar 17 22:03:48.671811 systemd[1]: Reached target swap.target. Mar 17 22:03:48.671838 systemd[1]: Reached target torcx.target. Mar 17 22:03:48.671859 systemd[1]: Reached target veritysetup.target. Mar 17 22:03:48.671904 systemd[1]: Listening on systemd-coredump.socket. Mar 17 22:03:48.671928 systemd[1]: Listening on systemd-initctl.socket. Mar 17 22:03:48.671949 systemd[1]: Listening on systemd-networkd.socket. Mar 17 22:03:48.671969 systemd[1]: Listening on systemd-udevd-control.socket. Mar 17 22:03:48.671990 systemd[1]: Listening on systemd-udevd-kernel.socket. Mar 17 22:03:48.672011 systemd[1]: Listening on systemd-userdbd.socket. Mar 17 22:03:48.672032 systemd[1]: Mounting dev-hugepages.mount... Mar 17 22:03:48.672052 systemd[1]: Mounting dev-mqueue.mount... Mar 17 22:03:48.672072 systemd[1]: Mounting media.mount... Mar 17 22:03:48.672534 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Mar 17 22:03:48.672588 systemd[1]: Mounting sys-kernel-debug.mount... Mar 17 22:03:48.672612 systemd[1]: Mounting sys-kernel-tracing.mount... Mar 17 22:03:48.672633 systemd[1]: Mounting tmp.mount... Mar 17 22:03:48.672654 systemd[1]: Starting flatcar-tmpfiles.service... Mar 17 22:03:48.672675 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Mar 17 22:03:48.672696 systemd[1]: Starting kmod-static-nodes.service... Mar 17 22:03:48.672717 systemd[1]: Starting modprobe@configfs.service... Mar 17 22:03:48.672738 systemd[1]: Starting modprobe@dm_mod.service... Mar 17 22:03:48.672771 systemd[1]: Starting modprobe@drm.service... Mar 17 22:03:48.672794 systemd[1]: Starting modprobe@efi_pstore.service... Mar 17 22:03:48.672815 systemd[1]: Starting modprobe@fuse.service... Mar 17 22:03:48.672835 systemd[1]: Starting modprobe@loop.service... Mar 17 22:03:48.672864 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Mar 17 22:03:48.672901 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Mar 17 22:03:48.672922 systemd[1]: Stopped systemd-fsck-root.service. Mar 17 22:03:48.672943 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Mar 17 22:03:48.672964 systemd[1]: Stopped systemd-fsck-usr.service. Mar 17 22:03:48.673029 systemd[1]: Stopped systemd-journald.service. Mar 17 22:03:48.673056 systemd[1]: Starting systemd-journald.service... Mar 17 22:03:48.673077 systemd[1]: Starting systemd-modules-load.service... Mar 17 22:03:48.673113 kernel: fuse: init (API version 7.34) Mar 17 22:03:48.673164 systemd[1]: Starting systemd-network-generator.service... Mar 17 22:03:48.673192 systemd[1]: Starting systemd-remount-fs.service... Mar 17 22:03:48.673220 systemd[1]: Starting systemd-udev-trigger.service... Mar 17 22:03:48.673241 systemd[1]: verity-setup.service: Deactivated successfully. Mar 17 22:03:48.673263 systemd[1]: Stopped verity-setup.service. Mar 17 22:03:48.673286 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Mar 17 22:03:48.673322 systemd[1]: Mounted dev-hugepages.mount. Mar 17 22:03:48.673344 systemd[1]: Mounted dev-mqueue.mount. Mar 17 22:03:48.673365 systemd[1]: Mounted media.mount. Mar 17 22:03:48.673386 systemd[1]: Mounted sys-kernel-debug.mount. Mar 17 22:03:48.673407 systemd[1]: Mounted sys-kernel-tracing.mount. Mar 17 22:03:48.673427 systemd[1]: Mounted tmp.mount. Mar 17 22:03:48.673449 systemd[1]: Finished kmod-static-nodes.service. Mar 17 22:03:48.673469 systemd[1]: modprobe@configfs.service: Deactivated successfully. Mar 17 22:03:48.673489 systemd[1]: Finished modprobe@configfs.service. Mar 17 22:03:48.673527 systemd-journald[984]: Journal started Mar 17 22:03:48.673619 systemd-journald[984]: Runtime Journal (/run/log/journal/747dab5de6bb4fb2b534417b0659d3e8) is 4.7M, max 38.1M, 33.3M free. Mar 17 22:03:44.665000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Mar 17 22:03:48.684446 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Mar 17 22:03:48.684496 kernel: loop: module loaded Mar 17 22:03:48.684526 systemd[1]: Finished modprobe@dm_mod.service. Mar 17 22:03:48.684555 systemd[1]: modprobe@drm.service: Deactivated successfully. Mar 17 22:03:48.684582 systemd[1]: Finished modprobe@drm.service. Mar 17 22:03:44.746000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Mar 17 22:03:44.746000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Mar 17 22:03:44.746000 audit: BPF prog-id=10 op=LOAD Mar 17 22:03:44.746000 audit: BPF prog-id=10 op=UNLOAD Mar 17 22:03:44.746000 audit: BPF prog-id=11 op=LOAD Mar 17 22:03:44.746000 audit: BPF prog-id=11 op=UNLOAD Mar 17 22:03:44.881000 audit[903]: AVC avc: denied { associate } for pid=903 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Mar 17 22:03:44.881000 audit[903]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001058cc a1=c00002ae40 a2=c000029100 a3=32 items=0 ppid=886 pid=903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:03:44.881000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Mar 17 22:03:44.884000 audit[903]: AVC avc: denied { associate } for pid=903 comm="torcx-generator" name="lib" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Mar 17 22:03:44.884000 audit[903]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001059a5 a2=1ed a3=0 items=2 ppid=886 pid=903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:03:44.884000 audit: CWD cwd="/" Mar 17 22:03:44.884000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 22:03:44.884000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 22:03:44.884000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Mar 17 22:03:48.391000 audit: BPF prog-id=12 op=LOAD Mar 17 22:03:48.391000 audit: BPF prog-id=3 op=UNLOAD Mar 17 22:03:48.391000 audit: BPF prog-id=13 op=LOAD Mar 17 22:03:48.391000 audit: BPF prog-id=14 op=LOAD Mar 17 22:03:48.391000 audit: BPF prog-id=4 op=UNLOAD Mar 17 22:03:48.391000 audit: BPF prog-id=5 op=UNLOAD Mar 17 22:03:48.393000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:48.398000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:48.398000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:48.403000 audit: BPF prog-id=12 op=UNLOAD Mar 17 22:03:48.573000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:48.579000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:48.584000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:48.584000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:48.585000 audit: BPF prog-id=15 op=LOAD Mar 17 22:03:48.585000 audit: BPF prog-id=16 op=LOAD Mar 17 22:03:48.585000 audit: BPF prog-id=17 op=LOAD Mar 17 22:03:48.586000 audit: BPF prog-id=13 op=UNLOAD Mar 17 22:03:48.586000 audit: BPF prog-id=14 op=UNLOAD Mar 17 22:03:48.637000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:48.659000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Mar 17 22:03:48.659000 audit[984]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=4 a1=7ffe502f5220 a2=4000 a3=7ffe502f52bc items=0 ppid=1 pid=984 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:03:48.659000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Mar 17 22:03:48.665000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:48.673000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:48.673000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:48.679000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:48.679000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:48.684000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:48.689212 systemd[1]: Started systemd-journald.service. Mar 17 22:03:48.685000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:48.687000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:48.385970 systemd[1]: Queued start job for default target multi-user.target. Mar 17 22:03:48.691000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:48.691000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:44.878590 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2025-03-17T22:03:44Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" Mar 17 22:03:48.695000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:48.695000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:48.386007 systemd[1]: Unnecessary job was removed for dev-vda6.device. Mar 17 22:03:44.879224 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2025-03-17T22:03:44Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Mar 17 22:03:48.392983 systemd[1]: systemd-journald.service: Deactivated successfully. Mar 17 22:03:44.879264 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2025-03-17T22:03:44Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Mar 17 22:03:48.688217 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Mar 17 22:03:44.879335 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2025-03-17T22:03:44Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Mar 17 22:03:48.691232 systemd[1]: Finished modprobe@efi_pstore.service. Mar 17 22:03:44.879354 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2025-03-17T22:03:44Z" level=debug msg="skipped missing lower profile" missing profile=oem Mar 17 22:03:48.696000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:48.692510 systemd[1]: modprobe@fuse.service: Deactivated successfully. Mar 17 22:03:44.879410 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2025-03-17T22:03:44Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Mar 17 22:03:48.694953 systemd[1]: Finished modprobe@fuse.service. Mar 17 22:03:44.879433 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2025-03-17T22:03:44Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Mar 17 22:03:48.696318 systemd[1]: Finished flatcar-tmpfiles.service. Mar 17 22:03:44.879795 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2025-03-17T22:03:44Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Mar 17 22:03:48.697590 systemd[1]: modprobe@loop.service: Deactivated successfully. Mar 17 22:03:44.879869 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2025-03-17T22:03:44Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Mar 17 22:03:44.879896 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2025-03-17T22:03:44Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Mar 17 22:03:44.880706 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2025-03-17T22:03:44Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Mar 17 22:03:44.880777 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2025-03-17T22:03:44Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Mar 17 22:03:44.880813 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2025-03-17T22:03:44Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.7: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.7 Mar 17 22:03:44.880840 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2025-03-17T22:03:44Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Mar 17 22:03:44.880872 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2025-03-17T22:03:44Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.7: no such file or directory" path=/var/lib/torcx/store/3510.3.7 Mar 17 22:03:48.701000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:48.701000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:48.702000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:44.880899 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2025-03-17T22:03:44Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Mar 17 22:03:48.700447 systemd[1]: Finished modprobe@loop.service. Mar 17 22:03:47.765917 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2025-03-17T22:03:47Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Mar 17 22:03:48.703000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:48.702230 systemd[1]: Finished systemd-modules-load.service. Mar 17 22:03:48.705000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:47.766352 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2025-03-17T22:03:47Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Mar 17 22:03:48.703292 systemd[1]: Finished systemd-network-generator.service. Mar 17 22:03:47.766565 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2025-03-17T22:03:47Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Mar 17 22:03:48.704470 systemd[1]: Finished systemd-remount-fs.service. Mar 17 22:03:47.766980 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2025-03-17T22:03:47Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Mar 17 22:03:47.767481 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2025-03-17T22:03:47Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Mar 17 22:03:47.767634 /usr/lib/systemd/system-generators/torcx-generator[903]: time="2025-03-17T22:03:47Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Mar 17 22:03:48.706461 systemd[1]: Reached target network-pre.target. Mar 17 22:03:48.709180 systemd[1]: Mounting sys-fs-fuse-connections.mount... Mar 17 22:03:48.715309 systemd[1]: Mounting sys-kernel-config.mount... Mar 17 22:03:48.718967 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Mar 17 22:03:48.722225 systemd[1]: Starting systemd-hwdb-update.service... Mar 17 22:03:48.727788 systemd[1]: Starting systemd-journal-flush.service... Mar 17 22:03:48.729175 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Mar 17 22:03:48.734367 systemd[1]: Starting systemd-random-seed.service... Mar 17 22:03:48.735365 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Mar 17 22:03:48.737317 systemd[1]: Starting systemd-sysctl.service... Mar 17 22:03:48.740129 systemd[1]: Starting systemd-sysusers.service... Mar 17 22:03:48.743915 systemd[1]: Mounted sys-fs-fuse-connections.mount. Mar 17 22:03:48.744758 systemd[1]: Mounted sys-kernel-config.mount. Mar 17 22:03:48.751536 systemd-journald[984]: Time spent on flushing to /var/log/journal/747dab5de6bb4fb2b534417b0659d3e8 is 73.304ms for 1288 entries. Mar 17 22:03:48.751536 systemd-journald[984]: System Journal (/var/log/journal/747dab5de6bb4fb2b534417b0659d3e8) is 8.0M, max 584.8M, 576.8M free. Mar 17 22:03:48.837914 systemd-journald[984]: Received client request to flush runtime journal. Mar 17 22:03:48.767000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:48.787000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:48.788000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:48.766456 systemd[1]: Finished systemd-random-seed.service. Mar 17 22:03:48.841000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:48.767424 systemd[1]: Reached target first-boot-complete.target. Mar 17 22:03:48.786946 systemd[1]: Finished systemd-sysusers.service. Mar 17 22:03:48.788147 systemd[1]: Finished systemd-sysctl.service. Mar 17 22:03:48.790708 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Mar 17 22:03:48.840463 systemd[1]: Finished systemd-journal-flush.service. Mar 17 22:03:48.848000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:48.847587 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Mar 17 22:03:48.914000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:48.913988 systemd[1]: Finished systemd-udev-trigger.service. Mar 17 22:03:48.917310 systemd[1]: Starting systemd-udev-settle.service... Mar 17 22:03:48.933526 udevadm[1015]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Mar 17 22:03:49.444235 systemd[1]: Finished systemd-hwdb-update.service. Mar 17 22:03:49.454106 kernel: kauditd_printk_skb: 96 callbacks suppressed Mar 17 22:03:49.454349 kernel: audit: type=1130 audit(1742249029.446:136): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:49.446000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:49.454000 audit: BPF prog-id=18 op=LOAD Mar 17 22:03:49.455448 systemd[1]: Starting systemd-udevd.service... Mar 17 22:03:49.454000 audit: BPF prog-id=19 op=LOAD Mar 17 22:03:49.454000 audit: BPF prog-id=7 op=UNLOAD Mar 17 22:03:49.454000 audit: BPF prog-id=8 op=UNLOAD Mar 17 22:03:49.457138 kernel: audit: type=1334 audit(1742249029.454:137): prog-id=18 op=LOAD Mar 17 22:03:49.457210 kernel: audit: type=1334 audit(1742249029.454:138): prog-id=19 op=LOAD Mar 17 22:03:49.457270 kernel: audit: type=1334 audit(1742249029.454:139): prog-id=7 op=UNLOAD Mar 17 22:03:49.457307 kernel: audit: type=1334 audit(1742249029.454:140): prog-id=8 op=UNLOAD Mar 17 22:03:49.489799 systemd-udevd[1016]: Using default interface naming scheme 'v252'. Mar 17 22:03:49.527970 systemd[1]: Started systemd-udevd.service. Mar 17 22:03:49.536051 kernel: audit: type=1130 audit(1742249029.528:141): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:49.528000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:49.559689 kernel: audit: type=1334 audit(1742249029.554:142): prog-id=20 op=LOAD Mar 17 22:03:49.554000 audit: BPF prog-id=20 op=LOAD Mar 17 22:03:49.555836 systemd[1]: Starting systemd-networkd.service... Mar 17 22:03:49.593001 kernel: audit: type=1334 audit(1742249029.584:143): prog-id=21 op=LOAD Mar 17 22:03:49.593203 kernel: audit: type=1334 audit(1742249029.584:144): prog-id=22 op=LOAD Mar 17 22:03:49.593293 kernel: audit: type=1334 audit(1742249029.584:145): prog-id=23 op=LOAD Mar 17 22:03:49.584000 audit: BPF prog-id=21 op=LOAD Mar 17 22:03:49.584000 audit: BPF prog-id=22 op=LOAD Mar 17 22:03:49.584000 audit: BPF prog-id=23 op=LOAD Mar 17 22:03:49.586062 systemd[1]: Starting systemd-userdbd.service... Mar 17 22:03:49.624869 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Mar 17 22:03:49.645000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:49.644549 systemd[1]: Started systemd-userdbd.service. Mar 17 22:03:49.714198 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input3 Mar 17 22:03:49.756114 kernel: ACPI: button: Power Button [PWRF] Mar 17 22:03:49.775111 kernel: mousedev: PS/2 mouse device common for all mice Mar 17 22:03:49.800217 systemd-networkd[1031]: lo: Link UP Mar 17 22:03:49.800232 systemd-networkd[1031]: lo: Gained carrier Mar 17 22:03:49.801020 systemd-networkd[1031]: Enumeration completed Mar 17 22:03:49.804000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:49.801184 systemd[1]: Started systemd-networkd.service. Mar 17 22:03:49.804865 systemd-networkd[1031]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Mar 17 22:03:49.814165 systemd-networkd[1031]: eth0: Link UP Mar 17 22:03:49.814180 systemd-networkd[1031]: eth0: Gained carrier Mar 17 22:03:49.820166 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Mar 17 22:03:49.832311 systemd-networkd[1031]: eth0: DHCPv4 address 10.244.26.146/30, gateway 10.244.26.145 acquired from 10.244.26.145 Mar 17 22:03:49.856000 audit[1029]: AVC avc: denied { confidentiality } for pid=1029 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Mar 17 22:03:49.856000 audit[1029]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5594831896c0 a1=338ac a2=7f38d06a4bc5 a3=5 items=110 ppid=1016 pid=1029 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:03:49.856000 audit: CWD cwd="/" Mar 17 22:03:49.856000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 22:03:49.856000 audit: PATH item=1 name=(null) inode=16418 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 22:03:49.856000 audit: PATH item=2 name=(null) inode=16418 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 22:03:49.856000 audit: PATH item=3 name=(null) inode=16419 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 22:03:49.856000 audit: PATH item=4 name=(null) inode=16418 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 22:03:49.856000 audit: PATH item=5 name=(null) inode=16420 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 22:03:49.856000 audit: PATH item=6 name=(null) inode=16418 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 22:03:49.856000 audit: PATH item=7 name=(null) inode=16421 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 22:03:49.856000 audit: PATH item=8 name=(null) inode=16421 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 22:03:49.856000 audit: PATH item=9 name=(null) inode=16422 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 22:03:49.856000 audit: PATH item=10 name=(null) inode=16421 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 22:03:49.856000 audit: PATH item=11 name=(null) inode=16423 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 22:03:49.856000 audit: PATH item=12 name=(null) inode=16421 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 22:03:49.856000 audit: PATH item=13 name=(null) inode=16424 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 22:03:49.856000 audit: PATH item=14 name=(null) inode=16421 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 22:03:49.856000 audit: PATH item=15 name=(null) inode=16425 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 22:03:49.856000 audit: PATH item=16 name=(null) inode=16421 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 22:03:49.856000 audit: PATH item=17 name=(null) inode=16426 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 22:03:49.856000 audit: PATH item=18 name=(null) inode=16418 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 22:03:49.856000 audit: PATH item=19 name=(null) inode=16427 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 22:03:49.856000 audit: PATH item=20 name=(null) inode=16427 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 22:03:49.856000 audit: PATH item=21 name=(null) inode=16428 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 22:03:49.856000 audit: PATH item=22 name=(null) inode=16427 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 22:03:49.856000 audit: PATH item=23 name=(null) inode=16429 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 22:03:49.856000 audit: PATH item=24 name=(null) inode=16427 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 22:03:49.856000 audit: PATH item=25 name=(null) inode=16430 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 22:03:49.856000 audit: PATH item=26 name=(null) inode=16427 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 22:03:49.856000 audit: PATH item=27 name=(null) inode=16431 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 22:03:49.856000 audit: PATH item=28 name=(null) inode=16427 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 22:03:49.856000 audit: PATH item=29 name=(null) inode=16432 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 22:03:49.856000 audit: PATH item=30 name=(null) inode=16418 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 22:03:49.856000 audit: PATH item=31 name=(null) inode=16433 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 22:03:49.856000 audit: PATH item=32 name=(null) inode=16433 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 22:03:49.856000 audit: PATH item=33 name=(null) inode=16434 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 22:03:49.856000 audit: PATH item=34 name=(null) inode=16433 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 22:03:49.856000 audit: PATH item=35 name=(null) inode=16435 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 22:03:49.856000 audit: PATH item=36 name=(null) inode=16433 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 22:03:49.856000 audit: PATH item=37 name=(null) inode=16436 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 22:03:49.856000 audit: PATH item=38 name=(null) inode=16433 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 22:03:49.856000 audit: PATH item=39 name=(null) inode=16437 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 22:03:49.856000 audit: PATH item=40 name=(null) inode=16433 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 22:03:49.856000 audit: PATH item=41 name=(null) inode=16438 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 22:03:49.856000 audit: PATH item=42 name=(null) inode=16418 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 22:03:49.856000 audit: PATH item=43 name=(null) inode=16439 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 22:03:49.856000 audit: PATH item=44 name=(null) inode=16439 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 22:03:49.856000 audit: PATH item=45 name=(null) inode=16440 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 22:03:49.856000 audit: PATH item=46 name=(null) inode=16439 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 22:03:49.856000 audit: PATH item=47 name=(null) inode=16441 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 22:03:49.856000 audit: PATH item=48 name=(null) inode=16439 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 22:03:49.856000 audit: PATH item=49 name=(null) inode=16442 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 22:03:49.856000 audit: PATH item=50 name=(null) inode=16439 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 22:03:49.856000 audit: PATH item=51 name=(null) inode=16443 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 22:03:49.856000 audit: PATH item=52 name=(null) inode=16439 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 22:03:49.856000 audit: PATH item=53 name=(null) inode=16444 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 22:03:49.856000 audit: PATH item=54 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 22:03:49.856000 audit: PATH item=55 name=(null) inode=16445 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 22:03:49.856000 audit: PATH item=56 name=(null) inode=16445 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 22:03:49.856000 audit: PATH item=57 name=(null) inode=16446 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 22:03:49.856000 audit: PATH item=58 name=(null) inode=16445 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 22:03:49.856000 audit: PATH item=59 name=(null) inode=16447 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 22:03:49.856000 audit: PATH item=60 name=(null) inode=16445 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 22:03:49.856000 audit: PATH item=61 name=(null) inode=16448 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 22:03:49.856000 audit: PATH item=62 name=(null) inode=16448 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 22:03:49.856000 audit: PATH item=63 name=(null) inode=16449 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 22:03:49.856000 audit: PATH item=64 name=(null) inode=16448 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 22:03:49.856000 audit: PATH item=65 name=(null) inode=16450 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 22:03:49.856000 audit: PATH item=66 name=(null) inode=16448 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 22:03:49.856000 audit: PATH item=67 name=(null) inode=16451 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 22:03:49.856000 audit: PATH item=68 name=(null) inode=16448 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 22:03:49.856000 audit: PATH item=69 name=(null) inode=16452 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 22:03:49.856000 audit: PATH item=70 name=(null) inode=16448 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 22:03:49.856000 audit: PATH item=71 name=(null) inode=16453 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 22:03:49.856000 audit: PATH item=72 name=(null) inode=16445 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 22:03:49.856000 audit: PATH item=73 name=(null) inode=16454 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 22:03:49.856000 audit: PATH item=74 name=(null) inode=16454 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 22:03:49.856000 audit: PATH item=75 name=(null) inode=16455 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 22:03:49.856000 audit: PATH item=76 name=(null) inode=16454 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 22:03:49.856000 audit: PATH item=77 name=(null) inode=16456 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 22:03:49.856000 audit: PATH item=78 name=(null) inode=16454 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 22:03:49.856000 audit: PATH item=79 name=(null) inode=16457 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 22:03:49.856000 audit: PATH item=80 name=(null) inode=16454 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 22:03:49.856000 audit: PATH item=81 name=(null) inode=16458 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 22:03:49.856000 audit: PATH item=82 name=(null) inode=16454 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 22:03:49.856000 audit: PATH item=83 name=(null) inode=16459 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 22:03:49.856000 audit: PATH item=84 name=(null) inode=16445 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 22:03:49.856000 audit: PATH item=85 name=(null) inode=16460 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 22:03:49.856000 audit: PATH item=86 name=(null) inode=16460 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 22:03:49.856000 audit: PATH item=87 name=(null) inode=16461 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 22:03:49.856000 audit: PATH item=88 name=(null) inode=16460 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 22:03:49.856000 audit: PATH item=89 name=(null) inode=16462 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 22:03:49.856000 audit: PATH item=90 name=(null) inode=16460 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 22:03:49.856000 audit: PATH item=91 name=(null) inode=16463 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 22:03:49.856000 audit: PATH item=92 name=(null) inode=16460 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 22:03:49.856000 audit: PATH item=93 name=(null) inode=16464 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 22:03:49.856000 audit: PATH item=94 name=(null) inode=16460 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 22:03:49.856000 audit: PATH item=95 name=(null) inode=16465 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 22:03:49.856000 audit: PATH item=96 name=(null) inode=16445 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 22:03:49.856000 audit: PATH item=97 name=(null) inode=16466 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 22:03:49.856000 audit: PATH item=98 name=(null) inode=16466 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 22:03:49.856000 audit: PATH item=99 name=(null) inode=16467 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 22:03:49.856000 audit: PATH item=100 name=(null) inode=16466 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 22:03:49.856000 audit: PATH item=101 name=(null) inode=16468 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 22:03:49.856000 audit: PATH item=102 name=(null) inode=16466 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 22:03:49.856000 audit: PATH item=103 name=(null) inode=16469 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 22:03:49.856000 audit: PATH item=104 name=(null) inode=16466 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 22:03:49.856000 audit: PATH item=105 name=(null) inode=16470 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 22:03:49.856000 audit: PATH item=106 name=(null) inode=16466 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 22:03:49.856000 audit: PATH item=107 name=(null) inode=16471 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 22:03:49.856000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 22:03:49.856000 audit: PATH item=109 name=(null) inode=16472 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 22:03:49.856000 audit: PROCTITLE proctitle="(udev-worker)" Mar 17 22:03:49.923094 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input4 Mar 17 22:03:49.923296 kernel: i801_smbus 0000:00:1f.3: SMBus using PCI interrupt Mar 17 22:03:49.940889 kernel: i2c i2c-0: 1/1 memory slots populated (from DMI) Mar 17 22:03:49.941200 kernel: i2c i2c-0: Memory type 0x07 not supported yet, not instantiating SPD Mar 17 22:03:50.079128 systemd[1]: Finished systemd-udev-settle.service. Mar 17 22:03:50.079000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:50.082493 systemd[1]: Starting lvm2-activation-early.service... Mar 17 22:03:50.109786 lvm[1045]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Mar 17 22:03:50.143000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:50.144019 systemd[1]: Finished lvm2-activation-early.service. Mar 17 22:03:50.145020 systemd[1]: Reached target cryptsetup.target. Mar 17 22:03:50.147546 systemd[1]: Starting lvm2-activation.service... Mar 17 22:03:50.155856 lvm[1046]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Mar 17 22:03:50.186681 systemd[1]: Finished lvm2-activation.service. Mar 17 22:03:50.188000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:50.189153 systemd[1]: Reached target local-fs-pre.target. Mar 17 22:03:50.189835 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Mar 17 22:03:50.189890 systemd[1]: Reached target local-fs.target. Mar 17 22:03:50.190567 systemd[1]: Reached target machines.target. Mar 17 22:03:50.193360 systemd[1]: Starting ldconfig.service... Mar 17 22:03:50.194629 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Mar 17 22:03:50.194686 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Mar 17 22:03:50.196697 systemd[1]: Starting systemd-boot-update.service... Mar 17 22:03:50.198885 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Mar 17 22:03:50.207509 systemd[1]: Starting systemd-machine-id-commit.service... Mar 17 22:03:50.211206 systemd[1]: Starting systemd-sysext.service... Mar 17 22:03:50.213515 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1048 (bootctl) Mar 17 22:03:50.217066 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Mar 17 22:03:50.231479 systemd[1]: Unmounting usr-share-oem.mount... Mar 17 22:03:50.241881 systemd[1]: usr-share-oem.mount: Deactivated successfully. Mar 17 22:03:50.242170 systemd[1]: Unmounted usr-share-oem.mount. Mar 17 22:03:50.266130 kernel: loop0: detected capacity change from 0 to 218376 Mar 17 22:03:50.274307 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Mar 17 22:03:50.275000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:50.402918 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Mar 17 22:03:50.403801 systemd[1]: Finished systemd-machine-id-commit.service. Mar 17 22:03:50.404000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:50.423451 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Mar 17 22:03:50.444132 kernel: loop1: detected capacity change from 0 to 218376 Mar 17 22:03:50.455927 (sd-sysext)[1061]: Using extensions 'kubernetes'. Mar 17 22:03:50.459314 (sd-sysext)[1061]: Merged extensions into '/usr'. Mar 17 22:03:50.481771 systemd-fsck[1058]: fsck.fat 4.2 (2021-01-31) Mar 17 22:03:50.481771 systemd-fsck[1058]: /dev/vda1: 789 files, 119299/258078 clusters Mar 17 22:03:50.496363 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Mar 17 22:03:50.497000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:50.501162 systemd[1]: Mounting boot.mount... Mar 17 22:03:50.502486 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Mar 17 22:03:50.504857 systemd[1]: Mounting usr-share-oem.mount... Mar 17 22:03:50.509402 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Mar 17 22:03:50.511380 systemd[1]: Starting modprobe@dm_mod.service... Mar 17 22:03:50.514140 systemd[1]: Starting modprobe@efi_pstore.service... Mar 17 22:03:50.517311 systemd[1]: Starting modprobe@loop.service... Mar 17 22:03:50.520244 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Mar 17 22:03:50.520497 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Mar 17 22:03:50.520716 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Mar 17 22:03:50.525064 systemd[1]: Mounted usr-share-oem.mount. Mar 17 22:03:50.526288 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Mar 17 22:03:50.526522 systemd[1]: Finished modprobe@efi_pstore.service. Mar 17 22:03:50.528000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:50.528000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:50.532061 systemd[1]: Mounted boot.mount. Mar 17 22:03:50.533961 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Mar 17 22:03:50.534177 systemd[1]: Finished modprobe@dm_mod.service. Mar 17 22:03:50.534000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:50.534000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:50.536000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:50.536000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:50.535443 systemd[1]: modprobe@loop.service: Deactivated successfully. Mar 17 22:03:50.535624 systemd[1]: Finished modprobe@loop.service. Mar 17 22:03:50.539854 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Mar 17 22:03:50.540021 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Mar 17 22:03:50.543276 systemd[1]: Finished systemd-sysext.service. Mar 17 22:03:50.544000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:50.546919 systemd[1]: Starting ensure-sysext.service... Mar 17 22:03:50.550443 systemd[1]: Starting systemd-tmpfiles-setup.service... Mar 17 22:03:50.559420 systemd[1]: Reloading. Mar 17 22:03:50.595281 systemd-tmpfiles[1069]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Mar 17 22:03:50.599409 systemd-tmpfiles[1069]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Mar 17 22:03:50.606009 systemd-tmpfiles[1069]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Mar 17 22:03:50.638977 /usr/lib/systemd/system-generators/torcx-generator[1088]: time="2025-03-17T22:03:50Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" Mar 17 22:03:50.639609 /usr/lib/systemd/system-generators/torcx-generator[1088]: time="2025-03-17T22:03:50Z" level=info msg="torcx already run" Mar 17 22:03:50.783700 ldconfig[1047]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Mar 17 22:03:50.870373 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Mar 17 22:03:50.870408 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Mar 17 22:03:50.893048 systemd-networkd[1031]: eth0: Gained IPv6LL Mar 17 22:03:50.903648 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Mar 17 22:03:50.991000 audit: BPF prog-id=24 op=LOAD Mar 17 22:03:50.991000 audit: BPF prog-id=20 op=UNLOAD Mar 17 22:03:50.993000 audit: BPF prog-id=25 op=LOAD Mar 17 22:03:50.993000 audit: BPF prog-id=15 op=UNLOAD Mar 17 22:03:50.993000 audit: BPF prog-id=26 op=LOAD Mar 17 22:03:50.993000 audit: BPF prog-id=27 op=LOAD Mar 17 22:03:50.993000 audit: BPF prog-id=16 op=UNLOAD Mar 17 22:03:50.993000 audit: BPF prog-id=17 op=UNLOAD Mar 17 22:03:51.000000 audit: BPF prog-id=28 op=LOAD Mar 17 22:03:51.000000 audit: BPF prog-id=21 op=UNLOAD Mar 17 22:03:51.000000 audit: BPF prog-id=29 op=LOAD Mar 17 22:03:51.001000 audit: BPF prog-id=30 op=LOAD Mar 17 22:03:51.001000 audit: BPF prog-id=22 op=UNLOAD Mar 17 22:03:51.001000 audit: BPF prog-id=23 op=UNLOAD Mar 17 22:03:51.001000 audit: BPF prog-id=31 op=LOAD Mar 17 22:03:51.001000 audit: BPF prog-id=32 op=LOAD Mar 17 22:03:51.001000 audit: BPF prog-id=18 op=UNLOAD Mar 17 22:03:51.001000 audit: BPF prog-id=19 op=UNLOAD Mar 17 22:03:51.011567 systemd[1]: Finished ldconfig.service. Mar 17 22:03:51.012000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:51.013442 systemd[1]: Finished systemd-boot-update.service. Mar 17 22:03:51.014000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:51.016899 systemd[1]: Finished systemd-tmpfiles-setup.service. Mar 17 22:03:51.017000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:51.023701 systemd[1]: Starting audit-rules.service... Mar 17 22:03:51.026734 systemd[1]: Starting clean-ca-certificates.service... Mar 17 22:03:51.035000 audit: BPF prog-id=33 op=LOAD Mar 17 22:03:51.039000 audit: BPF prog-id=34 op=LOAD Mar 17 22:03:51.032905 systemd[1]: Starting systemd-journal-catalog-update.service... Mar 17 22:03:51.036656 systemd[1]: Starting systemd-resolved.service... Mar 17 22:03:51.041320 systemd[1]: Starting systemd-timesyncd.service... Mar 17 22:03:51.046324 systemd[1]: Starting systemd-update-utmp.service... Mar 17 22:03:51.060000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:51.059554 systemd[1]: Finished clean-ca-certificates.service. Mar 17 22:03:51.060724 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Mar 17 22:03:51.069385 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Mar 17 22:03:51.070000 audit[1146]: SYSTEM_BOOT pid=1146 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Mar 17 22:03:51.072944 systemd[1]: Starting modprobe@dm_mod.service... Mar 17 22:03:51.077187 systemd[1]: Starting modprobe@efi_pstore.service... Mar 17 22:03:51.081689 systemd[1]: Starting modprobe@loop.service... Mar 17 22:03:51.082485 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Mar 17 22:03:51.082718 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Mar 17 22:03:51.082968 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Mar 17 22:03:51.084493 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Mar 17 22:03:51.084730 systemd[1]: Finished modprobe@efi_pstore.service. Mar 17 22:03:51.087000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:51.087000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:51.087895 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Mar 17 22:03:51.088217 systemd[1]: Finished modprobe@dm_mod.service. Mar 17 22:03:51.088000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:51.088000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:51.089498 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Mar 17 22:03:51.091718 systemd[1]: Finished systemd-update-utmp.service. Mar 17 22:03:51.093000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:51.095956 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Mar 17 22:03:51.099301 systemd[1]: Starting modprobe@dm_mod.service... Mar 17 22:03:51.102491 systemd[1]: Starting modprobe@efi_pstore.service... Mar 17 22:03:51.103921 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Mar 17 22:03:51.104254 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Mar 17 22:03:51.104532 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Mar 17 22:03:51.106125 systemd[1]: modprobe@loop.service: Deactivated successfully. Mar 17 22:03:51.107782 systemd[1]: Finished modprobe@loop.service. Mar 17 22:03:51.108000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:51.108000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:51.109336 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Mar 17 22:03:51.109607 systemd[1]: Finished modprobe@dm_mod.service. Mar 17 22:03:51.110000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:51.110000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:51.110936 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Mar 17 22:03:51.116778 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Mar 17 22:03:51.119054 systemd[1]: Starting modprobe@dm_mod.service... Mar 17 22:03:51.122953 systemd[1]: Starting modprobe@drm.service... Mar 17 22:03:51.128036 systemd[1]: Starting modprobe@loop.service... Mar 17 22:03:51.129451 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Mar 17 22:03:51.129683 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Mar 17 22:03:51.133615 systemd[1]: Starting systemd-networkd-wait-online.service... Mar 17 22:03:51.134608 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Mar 17 22:03:51.138412 systemd[1]: Finished systemd-journal-catalog-update.service. Mar 17 22:03:51.139000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:51.140685 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Mar 17 22:03:51.140921 systemd[1]: Finished modprobe@efi_pstore.service. Mar 17 22:03:51.141000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:51.141000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:51.142604 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Mar 17 22:03:51.147128 systemd[1]: Starting systemd-update-done.service... Mar 17 22:03:51.150000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:51.149062 systemd[1]: Finished ensure-sysext.service. Mar 17 22:03:51.164000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:51.164000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:51.163913 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Mar 17 22:03:51.164155 systemd[1]: Finished modprobe@dm_mod.service. Mar 17 22:03:51.165313 systemd[1]: Finished systemd-networkd-wait-online.service. Mar 17 22:03:51.165000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:51.174401 systemd[1]: modprobe@drm.service: Deactivated successfully. Mar 17 22:03:51.174639 systemd[1]: Finished modprobe@drm.service. Mar 17 22:03:51.175000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:51.175000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:51.175775 systemd[1]: modprobe@loop.service: Deactivated successfully. Mar 17 22:03:51.175975 systemd[1]: Finished modprobe@loop.service. Mar 17 22:03:51.176000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:51.176000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:51.177001 systemd[1]: Finished systemd-update-done.service. Mar 17 22:03:51.177000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-done comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:03:51.177908 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Mar 17 22:03:51.206000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Mar 17 22:03:51.206000 audit[1167]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc87ba7ea0 a2=420 a3=0 items=0 ppid=1137 pid=1167 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:03:51.206000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Mar 17 22:03:51.206645 augenrules[1167]: No rules Mar 17 22:03:51.207573 systemd[1]: Finished audit-rules.service. Mar 17 22:03:51.231053 systemd[1]: Started systemd-timesyncd.service. Mar 17 22:03:51.232071 systemd[1]: Reached target time-set.target. Mar 17 22:03:51.233838 systemd-resolved[1141]: Positive Trust Anchors: Mar 17 22:03:51.233864 systemd-resolved[1141]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Mar 17 22:03:51.233903 systemd-resolved[1141]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Mar 17 22:03:51.241471 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Mar 17 22:03:51.241514 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Mar 17 22:03:51.245529 systemd-resolved[1141]: Using system hostname 'srv-zbif7.gb1.brightbox.com'. Mar 17 22:03:51.248499 systemd[1]: Started systemd-resolved.service. Mar 17 22:03:51.249401 systemd[1]: Reached target network.target. Mar 17 22:03:51.250048 systemd[1]: Reached target network-online.target. Mar 17 22:03:51.250685 systemd[1]: Reached target nss-lookup.target. Mar 17 22:03:51.251323 systemd[1]: Reached target sysinit.target. Mar 17 22:03:51.252092 systemd[1]: Started motdgen.path. Mar 17 22:03:51.266293 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Mar 17 22:03:51.267492 systemd[1]: Started logrotate.timer. Mar 17 22:03:51.268335 systemd[1]: Started mdadm.timer. Mar 17 22:03:51.268972 systemd[1]: Started systemd-tmpfiles-clean.timer. Mar 17 22:03:51.269668 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Mar 17 22:03:51.269721 systemd[1]: Reached target paths.target. Mar 17 22:03:51.270334 systemd[1]: Reached target timers.target. Mar 17 22:03:51.271494 systemd[1]: Listening on dbus.socket. Mar 17 22:03:51.273833 systemd[1]: Starting docker.socket... Mar 17 22:03:51.279073 systemd[1]: Listening on sshd.socket. Mar 17 22:03:51.279963 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Mar 17 22:03:51.280663 systemd[1]: Listening on docker.socket. Mar 17 22:03:51.281491 systemd[1]: Reached target sockets.target. Mar 17 22:03:51.282123 systemd[1]: Reached target basic.target. Mar 17 22:03:51.282792 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Mar 17 22:03:51.282855 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Mar 17 22:03:51.284698 systemd[1]: Starting containerd.service... Mar 17 22:03:51.288475 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Mar 17 22:03:51.291223 systemd[1]: Starting dbus.service... Mar 17 22:03:51.299818 systemd[1]: Starting enable-oem-cloudinit.service... Mar 17 22:03:51.306012 systemd[1]: Starting extend-filesystems.service... Mar 17 22:03:51.306980 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Mar 17 22:03:51.310733 systemd[1]: Starting kubelet.service... Mar 17 22:03:51.313775 systemd[1]: Starting motdgen.service... Mar 17 22:03:51.321161 systemd[1]: Starting prepare-helm.service... Mar 17 22:03:51.325434 systemd[1]: Starting ssh-key-proc-cmdline.service... Mar 17 22:03:51.332629 systemd[1]: Starting sshd-keygen.service... Mar 17 22:03:51.341279 jq[1180]: false Mar 17 22:03:51.341578 systemd[1]: Starting systemd-logind.service... Mar 17 22:03:51.342384 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Mar 17 22:03:51.342559 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Mar 17 22:03:51.343487 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Mar 17 22:03:51.345638 systemd[1]: Starting update-engine.service... Mar 17 22:03:51.350584 systemd[1]: Starting update-ssh-keys-after-ignition.service... Mar 17 22:03:51.354786 jq[1197]: true Mar 17 22:03:51.357400 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Mar 17 22:03:51.358621 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Mar 17 22:03:51.363762 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Mar 17 22:03:51.364757 systemd[1]: Finished ssh-key-proc-cmdline.service. Mar 17 22:03:51.387134 jq[1203]: true Mar 17 22:03:51.399470 tar[1202]: linux-amd64/LICENSE Mar 17 22:03:51.400990 tar[1202]: linux-amd64/helm Mar 17 22:03:51.422169 extend-filesystems[1181]: Found loop1 Mar 17 22:03:51.429169 extend-filesystems[1181]: Found vda Mar 17 22:03:51.441281 extend-filesystems[1181]: Found vda1 Mar 17 22:03:51.442490 extend-filesystems[1181]: Found vda2 Mar 17 22:03:51.444118 extend-filesystems[1181]: Found vda3 Mar 17 22:03:51.445175 extend-filesystems[1181]: Found usr Mar 17 22:03:51.446261 extend-filesystems[1181]: Found vda4 Mar 17 22:03:51.448892 extend-filesystems[1181]: Found vda6 Mar 17 22:03:51.450987 extend-filesystems[1181]: Found vda7 Mar 17 22:03:51.450987 extend-filesystems[1181]: Found vda9 Mar 17 22:03:51.450987 extend-filesystems[1181]: Checking size of /dev/vda9 Mar 17 22:03:51.459410 dbus-daemon[1177]: [system] SELinux support is enabled Mar 17 22:03:51.460241 systemd[1]: Started dbus.service. Mar 17 22:03:51.463781 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Mar 17 22:03:51.463847 systemd[1]: Reached target system-config.target. Mar 17 22:03:51.465897 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Mar 17 22:03:51.465939 systemd[1]: Reached target user-config.target. Mar 17 22:03:51.474680 systemd-networkd[1031]: eth0: Ignoring DHCPv6 address 2a02:1348:17d:6a4:24:19ff:fef4:1a92/128 (valid for 59min 59s, preferred for 59min 59s) which conflicts with 2a02:1348:17d:6a4:24:19ff:fef4:1a92/64 assigned by NDisc. Mar 17 22:03:51.474693 systemd-networkd[1031]: eth0: Hint: use IPv6Token= setting to change the address generated by NDisc or set UseAutonomousPrefix=no. Mar 17 22:03:51.475117 dbus-daemon[1177]: [system] Activating via systemd: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.2' (uid=244 pid=1031 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0") Mar 17 22:03:51.482112 systemd[1]: Starting systemd-hostnamed.service... Mar 17 22:03:51.483550 systemd[1]: motdgen.service: Deactivated successfully. Mar 17 22:03:51.484532 systemd[1]: Finished motdgen.service. Mar 17 22:03:51.529584 extend-filesystems[1181]: Resized partition /dev/vda9 Mar 17 22:03:51.965267 systemd-resolved[1141]: Clock change detected. Flushing caches. Mar 17 22:03:51.965689 systemd-timesyncd[1144]: Contacted time server 178.215.228.24:123 (0.flatcar.pool.ntp.org). Mar 17 22:03:51.965776 systemd-timesyncd[1144]: Initial clock synchronization to Mon 2025-03-17 22:03:51.965143 UTC. Mar 17 22:03:51.978061 extend-filesystems[1233]: resize2fs 1.46.5 (30-Dec-2021) Mar 17 22:03:51.993928 kernel: EXT4-fs (vda9): resizing filesystem from 1617920 to 15121403 blocks Mar 17 22:03:51.994110 update_engine[1195]: I0317 22:03:51.991190 1195 main.cc:92] Flatcar Update Engine starting Mar 17 22:03:52.011458 update_engine[1195]: I0317 22:03:52.005122 1195 update_check_scheduler.cc:74] Next update check in 9m16s Mar 17 22:03:52.005667 systemd[1]: Started update-engine.service. Mar 17 22:03:52.010227 systemd[1]: Started locksmithd.service. Mar 17 22:03:52.109350 env[1205]: time="2025-03-17T22:03:52.108690001Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Mar 17 22:03:52.132509 bash[1234]: Updated "/home/core/.ssh/authorized_keys" Mar 17 22:03:52.134086 systemd[1]: Finished update-ssh-keys-after-ignition.service. Mar 17 22:03:52.139163 systemd-logind[1193]: Watching system buttons on /dev/input/event2 (Power Button) Mar 17 22:03:52.139671 systemd-logind[1193]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Mar 17 22:03:52.142466 systemd-logind[1193]: New seat seat0. Mar 17 22:03:52.153344 systemd[1]: Started systemd-logind.service. Mar 17 22:03:52.188679 dbus-daemon[1177]: [system] Successfully activated service 'org.freedesktop.hostname1' Mar 17 22:03:52.189514 systemd[1]: Started systemd-hostnamed.service. Mar 17 22:03:52.189843 dbus-daemon[1177]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.6' (uid=0 pid=1220 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0") Mar 17 22:03:52.194624 systemd[1]: Starting polkit.service... Mar 17 22:03:52.215196 env[1205]: time="2025-03-17T22:03:52.213920224Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Mar 17 22:03:52.215196 env[1205]: time="2025-03-17T22:03:52.214208904Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Mar 17 22:03:52.219969 systemd[1]: Created slice system-sshd.slice. Mar 17 22:03:52.228461 env[1205]: time="2025-03-17T22:03:52.225987999Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.179-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Mar 17 22:03:52.228461 env[1205]: time="2025-03-17T22:03:52.226947197Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Mar 17 22:03:52.233469 env[1205]: time="2025-03-17T22:03:52.232968853Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Mar 17 22:03:52.233469 env[1205]: time="2025-03-17T22:03:52.233151249Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Mar 17 22:03:52.233469 env[1205]: time="2025-03-17T22:03:52.233192637Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Mar 17 22:03:52.233469 env[1205]: time="2025-03-17T22:03:52.233214871Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Mar 17 22:03:52.234892 env[1205]: time="2025-03-17T22:03:52.233879404Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Mar 17 22:03:52.239023 env[1205]: time="2025-03-17T22:03:52.238984340Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Mar 17 22:03:52.239323 env[1205]: time="2025-03-17T22:03:52.239246813Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Mar 17 22:03:52.239323 env[1205]: time="2025-03-17T22:03:52.239294076Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Mar 17 22:03:52.239440 env[1205]: time="2025-03-17T22:03:52.239377437Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Mar 17 22:03:52.239440 env[1205]: time="2025-03-17T22:03:52.239399303Z" level=info msg="metadata content store policy set" policy=shared Mar 17 22:03:52.241239 polkitd[1239]: Started polkitd version 121 Mar 17 22:03:52.268108 polkitd[1239]: Loading rules from directory /etc/polkit-1/rules.d Mar 17 22:03:52.270922 polkitd[1239]: Loading rules from directory /usr/share/polkit-1/rules.d Mar 17 22:03:52.274762 kernel: EXT4-fs (vda9): resized filesystem to 15121403 Mar 17 22:03:52.275531 polkitd[1239]: Finished loading, compiling and executing 2 rules Mar 17 22:03:52.276820 systemd[1]: Started polkit.service. Mar 17 22:03:52.302248 env[1205]: time="2025-03-17T22:03:52.301720906Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Mar 17 22:03:52.302248 env[1205]: time="2025-03-17T22:03:52.301796346Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Mar 17 22:03:52.302248 env[1205]: time="2025-03-17T22:03:52.301825965Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Mar 17 22:03:52.302248 env[1205]: time="2025-03-17T22:03:52.301916124Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Mar 17 22:03:52.302248 env[1205]: time="2025-03-17T22:03:52.301958398Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Mar 17 22:03:52.302248 env[1205]: time="2025-03-17T22:03:52.301998516Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Mar 17 22:03:52.302248 env[1205]: time="2025-03-17T22:03:52.302026916Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Mar 17 22:03:52.302248 env[1205]: time="2025-03-17T22:03:52.302053724Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Mar 17 22:03:52.302248 env[1205]: time="2025-03-17T22:03:52.302080227Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Mar 17 22:03:52.302248 env[1205]: time="2025-03-17T22:03:52.302136921Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Mar 17 22:03:52.302248 env[1205]: time="2025-03-17T22:03:52.302168011Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Mar 17 22:03:52.302248 env[1205]: time="2025-03-17T22:03:52.302199280Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Mar 17 22:03:52.276349 dbus-daemon[1177]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' Mar 17 22:03:52.298238 systemd-hostnamed[1220]: Hostname set to (static) Mar 17 22:03:52.310861 env[1205]: time="2025-03-17T22:03:52.302402877Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Mar 17 22:03:52.310861 env[1205]: time="2025-03-17T22:03:52.302666651Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Mar 17 22:03:52.310861 env[1205]: time="2025-03-17T22:03:52.303065344Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Mar 17 22:03:52.310861 env[1205]: time="2025-03-17T22:03:52.303121770Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Mar 17 22:03:52.310861 env[1205]: time="2025-03-17T22:03:52.303150439Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Mar 17 22:03:52.310861 env[1205]: time="2025-03-17T22:03:52.303242087Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Mar 17 22:03:52.310861 env[1205]: time="2025-03-17T22:03:52.303283107Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Mar 17 22:03:52.310861 env[1205]: time="2025-03-17T22:03:52.303313552Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Mar 17 22:03:52.310861 env[1205]: time="2025-03-17T22:03:52.303339385Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Mar 17 22:03:52.310861 env[1205]: time="2025-03-17T22:03:52.303371607Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Mar 17 22:03:52.310861 env[1205]: time="2025-03-17T22:03:52.303392963Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Mar 17 22:03:52.310861 env[1205]: time="2025-03-17T22:03:52.303412957Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Mar 17 22:03:52.310861 env[1205]: time="2025-03-17T22:03:52.303431310Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Mar 17 22:03:52.310861 env[1205]: time="2025-03-17T22:03:52.303479041Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Mar 17 22:03:52.310861 env[1205]: time="2025-03-17T22:03:52.303827595Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Mar 17 22:03:52.277119 polkitd[1239]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Mar 17 22:03:52.313286 extend-filesystems[1233]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required Mar 17 22:03:52.313286 extend-filesystems[1233]: old_desc_blocks = 1, new_desc_blocks = 8 Mar 17 22:03:52.313286 extend-filesystems[1233]: The filesystem on /dev/vda9 is now 15121403 (4k) blocks long. Mar 17 22:03:52.307920 systemd[1]: extend-filesystems.service: Deactivated successfully. Mar 17 22:03:52.322830 env[1205]: time="2025-03-17T22:03:52.303854848Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Mar 17 22:03:52.322830 env[1205]: time="2025-03-17T22:03:52.303874957Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Mar 17 22:03:52.322830 env[1205]: time="2025-03-17T22:03:52.303906903Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Mar 17 22:03:52.322830 env[1205]: time="2025-03-17T22:03:52.303941275Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Mar 17 22:03:52.322830 env[1205]: time="2025-03-17T22:03:52.303963028Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Mar 17 22:03:52.322830 env[1205]: time="2025-03-17T22:03:52.304010429Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Mar 17 22:03:52.322830 env[1205]: time="2025-03-17T22:03:52.304089721Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Mar 17 22:03:52.323941 extend-filesystems[1181]: Resized filesystem in /dev/vda9 Mar 17 22:03:52.308161 systemd[1]: Finished extend-filesystems.service. Mar 17 22:03:52.309377 systemd[1]: Started containerd.service. Mar 17 22:03:52.327503 env[1205]: time="2025-03-17T22:03:52.304462023Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Mar 17 22:03:52.327503 env[1205]: time="2025-03-17T22:03:52.304582745Z" level=info msg="Connect containerd service" Mar 17 22:03:52.327503 env[1205]: time="2025-03-17T22:03:52.304749073Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Mar 17 22:03:52.327503 env[1205]: time="2025-03-17T22:03:52.305998723Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Mar 17 22:03:52.327503 env[1205]: time="2025-03-17T22:03:52.307939829Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Mar 17 22:03:52.327503 env[1205]: time="2025-03-17T22:03:52.308051584Z" level=info msg=serving... address=/run/containerd/containerd.sock Mar 17 22:03:52.327503 env[1205]: time="2025-03-17T22:03:52.308147228Z" level=info msg="containerd successfully booted in 0.236502s" Mar 17 22:03:52.327503 env[1205]: time="2025-03-17T22:03:52.314068264Z" level=info msg="Start subscribing containerd event" Mar 17 22:03:52.327503 env[1205]: time="2025-03-17T22:03:52.314175231Z" level=info msg="Start recovering state" Mar 17 22:03:52.327503 env[1205]: time="2025-03-17T22:03:52.314505333Z" level=info msg="Start event monitor" Mar 17 22:03:52.327503 env[1205]: time="2025-03-17T22:03:52.314580853Z" level=info msg="Start snapshots syncer" Mar 17 22:03:52.327503 env[1205]: time="2025-03-17T22:03:52.314609016Z" level=info msg="Start cni network conf syncer for default" Mar 17 22:03:52.327503 env[1205]: time="2025-03-17T22:03:52.314624666Z" level=info msg="Start streaming server" Mar 17 22:03:53.045534 tar[1202]: linux-amd64/README.md Mar 17 22:03:53.055173 systemd[1]: Finished prepare-helm.service. Mar 17 22:03:53.084332 locksmithd[1235]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Mar 17 22:03:53.540868 systemd[1]: Started kubelet.service. Mar 17 22:03:53.847992 sshd_keygen[1210]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Mar 17 22:03:53.878851 systemd[1]: Finished sshd-keygen.service. Mar 17 22:03:53.882116 systemd[1]: Starting issuegen.service... Mar 17 22:03:53.885441 systemd[1]: Started sshd@0-10.244.26.146:22-139.178.89.65:35910.service. Mar 17 22:03:53.892098 systemd[1]: Started sshd@1-10.244.26.146:22-143.110.184.217:38756.service. Mar 17 22:03:53.914779 systemd[1]: issuegen.service: Deactivated successfully. Mar 17 22:03:53.915091 systemd[1]: Finished issuegen.service. Mar 17 22:03:53.919659 systemd[1]: Starting systemd-user-sessions.service... Mar 17 22:03:53.938469 systemd[1]: Finished systemd-user-sessions.service. Mar 17 22:03:53.942039 systemd[1]: Started getty@tty1.service. Mar 17 22:03:53.947287 systemd[1]: Started serial-getty@ttyS0.service. Mar 17 22:03:53.948476 systemd[1]: Reached target getty.target. Mar 17 22:03:54.239795 kubelet[1261]: E0317 22:03:54.239575 1261 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Mar 17 22:03:54.242621 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Mar 17 22:03:54.242886 systemd[1]: kubelet.service: Failed with result 'exit-code'. Mar 17 22:03:54.243421 systemd[1]: kubelet.service: Consumed 1.136s CPU time. Mar 17 22:03:54.635343 sshd[1276]: Invalid user gbase from 143.110.184.217 port 38756 Mar 17 22:03:54.805383 sshd[1276]: pam_faillock(sshd:auth): User unknown Mar 17 22:03:54.807054 sshd[1276]: pam_unix(sshd:auth): check pass; user unknown Mar 17 22:03:54.807316 sshd[1276]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.110.184.217 Mar 17 22:03:54.808852 sshd[1276]: pam_faillock(sshd:auth): User unknown Mar 17 22:03:54.821215 sshd[1275]: Accepted publickey for core from 139.178.89.65 port 35910 ssh2: RSA SHA256:zyhiPLENj58svNToN4BOPPS+na2TgK0IE73Z79n4eiY Mar 17 22:03:54.825027 sshd[1275]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 22:03:54.845372 systemd[1]: Created slice user-500.slice. Mar 17 22:03:54.849856 systemd[1]: Starting user-runtime-dir@500.service... Mar 17 22:03:54.861459 systemd-logind[1193]: New session 1 of user core. Mar 17 22:03:54.870259 systemd[1]: Finished user-runtime-dir@500.service. Mar 17 22:03:54.874864 systemd[1]: Starting user@500.service... Mar 17 22:03:54.881863 (systemd)[1286]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Mar 17 22:03:54.991841 systemd[1286]: Queued start job for default target default.target. Mar 17 22:03:54.994350 systemd[1286]: Reached target paths.target. Mar 17 22:03:54.994585 systemd[1286]: Reached target sockets.target. Mar 17 22:03:54.994785 systemd[1286]: Reached target timers.target. Mar 17 22:03:54.994949 systemd[1286]: Reached target basic.target. Mar 17 22:03:54.995185 systemd[1286]: Reached target default.target. Mar 17 22:03:54.995387 systemd[1]: Started user@500.service. Mar 17 22:03:54.995566 systemd[1286]: Startup finished in 101ms. Mar 17 22:03:54.998400 systemd[1]: Started session-1.scope. Mar 17 22:03:55.627751 systemd[1]: Started sshd@2-10.244.26.146:22-139.178.89.65:35916.service. Mar 17 22:03:56.519800 sshd[1295]: Accepted publickey for core from 139.178.89.65 port 35916 ssh2: RSA SHA256:zyhiPLENj58svNToN4BOPPS+na2TgK0IE73Z79n4eiY Mar 17 22:03:56.522596 sshd[1295]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 22:03:56.529308 systemd-logind[1193]: New session 2 of user core. Mar 17 22:03:56.530098 systemd[1]: Started session-2.scope. Mar 17 22:03:56.892398 systemd[1]: Started sshd@3-10.244.26.146:22-143.110.184.217:42900.service. Mar 17 22:03:57.141684 sshd[1295]: pam_unix(sshd:session): session closed for user core Mar 17 22:03:57.145532 systemd[1]: sshd@2-10.244.26.146:22-139.178.89.65:35916.service: Deactivated successfully. Mar 17 22:03:57.146684 systemd[1]: session-2.scope: Deactivated successfully. Mar 17 22:03:57.147551 systemd-logind[1193]: Session 2 logged out. Waiting for processes to exit. Mar 17 22:03:57.148846 systemd-logind[1193]: Removed session 2. Mar 17 22:03:57.289842 systemd[1]: Started sshd@4-10.244.26.146:22-139.178.89.65:35920.service. Mar 17 22:03:57.331966 sshd[1276]: Failed password for invalid user gbase from 143.110.184.217 port 38756 ssh2 Mar 17 22:03:57.751292 sshd[1299]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.110.184.217 user=root Mar 17 22:03:58.184598 sshd[1304]: Accepted publickey for core from 139.178.89.65 port 35920 ssh2: RSA SHA256:zyhiPLENj58svNToN4BOPPS+na2TgK0IE73Z79n4eiY Mar 17 22:03:58.187077 sshd[1304]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 22:03:58.193617 systemd-logind[1193]: New session 3 of user core. Mar 17 22:03:58.195016 systemd[1]: Started session-3.scope. Mar 17 22:03:58.806540 sshd[1304]: pam_unix(sshd:session): session closed for user core Mar 17 22:03:58.810329 systemd-logind[1193]: Session 3 logged out. Waiting for processes to exit. Mar 17 22:03:58.810826 systemd[1]: sshd@4-10.244.26.146:22-139.178.89.65:35920.service: Deactivated successfully. Mar 17 22:03:58.811771 systemd[1]: session-3.scope: Deactivated successfully. Mar 17 22:03:58.812956 systemd-logind[1193]: Removed session 3. Mar 17 22:03:58.879173 coreos-metadata[1176]: Mar 17 22:03:58.878 WARN failed to locate config-drive, using the metadata service API instead Mar 17 22:03:58.934838 coreos-metadata[1176]: Mar 17 22:03:58.934 INFO Fetching http://169.254.169.254/latest/meta-data/public-keys: Attempt #1 Mar 17 22:03:58.959881 coreos-metadata[1176]: Mar 17 22:03:58.959 INFO Fetch successful Mar 17 22:03:58.960295 coreos-metadata[1176]: Mar 17 22:03:58.960 INFO Fetching http://169.254.169.254/latest/meta-data/public-keys/0/openssh-key: Attempt #1 Mar 17 22:03:58.989895 coreos-metadata[1176]: Mar 17 22:03:58.989 INFO Fetch successful Mar 17 22:03:58.995458 unknown[1176]: wrote ssh authorized keys file for user: core Mar 17 22:03:59.026142 update-ssh-keys[1311]: Updated "/home/core/.ssh/authorized_keys" Mar 17 22:03:59.027026 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Mar 17 22:03:59.027779 systemd[1]: Reached target multi-user.target. Mar 17 22:03:59.030503 systemd[1]: Starting systemd-update-utmp-runlevel.service... Mar 17 22:03:59.044636 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Mar 17 22:03:59.044899 systemd[1]: Finished systemd-update-utmp-runlevel.service. Mar 17 22:03:59.045589 systemd[1]: Startup finished in 1.204s (kernel) + 6.851s (initrd) + 14.043s (userspace) = 22.099s. Mar 17 22:03:59.336417 sshd[1276]: Connection closed by invalid user gbase 143.110.184.217 port 38756 [preauth] Mar 17 22:03:59.337944 systemd[1]: sshd@1-10.244.26.146:22-143.110.184.217:38756.service: Deactivated successfully. Mar 17 22:04:00.018883 sshd[1299]: Failed password for root from 143.110.184.217 port 42900 ssh2 Mar 17 22:04:01.669478 sshd[1299]: Connection closed by authenticating user root 143.110.184.217 port 42900 [preauth] Mar 17 22:04:01.671716 systemd[1]: sshd@3-10.244.26.146:22-143.110.184.217:42900.service: Deactivated successfully. Mar 17 22:04:04.494329 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Mar 17 22:04:04.494657 systemd[1]: Stopped kubelet.service. Mar 17 22:04:04.494727 systemd[1]: kubelet.service: Consumed 1.136s CPU time. Mar 17 22:04:04.496913 systemd[1]: Starting kubelet.service... Mar 17 22:04:04.668839 systemd[1]: Started kubelet.service. Mar 17 22:04:04.792518 kubelet[1319]: E0317 22:04:04.792344 1319 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Mar 17 22:04:04.797294 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Mar 17 22:04:04.797533 systemd[1]: kubelet.service: Failed with result 'exit-code'. Mar 17 22:04:07.443141 systemd[1]: Started sshd@5-10.244.26.146:22-143.110.184.217:56482.service. Mar 17 22:04:08.125074 sshd[1326]: Invalid user demo from 143.110.184.217 port 56482 Mar 17 22:04:08.294164 sshd[1326]: pam_faillock(sshd:auth): User unknown Mar 17 22:04:08.295129 sshd[1326]: pam_unix(sshd:auth): check pass; user unknown Mar 17 22:04:08.295204 sshd[1326]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.110.184.217 Mar 17 22:04:08.296070 sshd[1326]: pam_faillock(sshd:auth): User unknown Mar 17 22:04:08.963982 systemd[1]: Started sshd@6-10.244.26.146:22-139.178.89.65:40004.service. Mar 17 22:04:09.894089 sshd[1329]: Accepted publickey for core from 139.178.89.65 port 40004 ssh2: RSA SHA256:zyhiPLENj58svNToN4BOPPS+na2TgK0IE73Z79n4eiY Mar 17 22:04:09.896923 sshd[1329]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 22:04:09.904579 systemd-logind[1193]: New session 4 of user core. Mar 17 22:04:09.906424 systemd[1]: Started session-4.scope. Mar 17 22:04:10.407576 sshd[1326]: Failed password for invalid user demo from 143.110.184.217 port 56482 ssh2 Mar 17 22:04:10.537915 sshd[1329]: pam_unix(sshd:session): session closed for user core Mar 17 22:04:10.543298 systemd[1]: sshd@6-10.244.26.146:22-139.178.89.65:40004.service: Deactivated successfully. Mar 17 22:04:10.544399 systemd[1]: session-4.scope: Deactivated successfully. Mar 17 22:04:10.544433 systemd-logind[1193]: Session 4 logged out. Waiting for processes to exit. Mar 17 22:04:10.546624 systemd-logind[1193]: Removed session 4. Mar 17 22:04:10.689740 systemd[1]: Started sshd@7-10.244.26.146:22-139.178.89.65:40018.service. Mar 17 22:04:11.609383 sshd[1335]: Accepted publickey for core from 139.178.89.65 port 40018 ssh2: RSA SHA256:zyhiPLENj58svNToN4BOPPS+na2TgK0IE73Z79n4eiY Mar 17 22:04:11.611914 sshd[1335]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 22:04:11.618903 systemd-logind[1193]: New session 5 of user core. Mar 17 22:04:11.619533 systemd[1]: Started session-5.scope. Mar 17 22:04:12.246861 sshd[1335]: pam_unix(sshd:session): session closed for user core Mar 17 22:04:12.250619 systemd[1]: sshd@7-10.244.26.146:22-139.178.89.65:40018.service: Deactivated successfully. Mar 17 22:04:12.251615 systemd[1]: session-5.scope: Deactivated successfully. Mar 17 22:04:12.252572 systemd-logind[1193]: Session 5 logged out. Waiting for processes to exit. Mar 17 22:04:12.254315 systemd-logind[1193]: Removed session 5. Mar 17 22:04:12.369658 sshd[1326]: Connection closed by invalid user demo 143.110.184.217 port 56482 [preauth] Mar 17 22:04:12.371602 systemd[1]: sshd@5-10.244.26.146:22-143.110.184.217:56482.service: Deactivated successfully. Mar 17 22:04:12.400347 systemd[1]: Started sshd@8-10.244.26.146:22-139.178.89.65:54104.service. Mar 17 22:04:13.291644 sshd[1342]: Accepted publickey for core from 139.178.89.65 port 54104 ssh2: RSA SHA256:zyhiPLENj58svNToN4BOPPS+na2TgK0IE73Z79n4eiY Mar 17 22:04:13.293879 sshd[1342]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 22:04:13.301938 systemd-logind[1193]: New session 6 of user core. Mar 17 22:04:13.302937 systemd[1]: Started session-6.scope. Mar 17 22:04:13.915673 sshd[1342]: pam_unix(sshd:session): session closed for user core Mar 17 22:04:13.919973 systemd[1]: sshd@8-10.244.26.146:22-139.178.89.65:54104.service: Deactivated successfully. Mar 17 22:04:13.920977 systemd[1]: session-6.scope: Deactivated successfully. Mar 17 22:04:13.922031 systemd-logind[1193]: Session 6 logged out. Waiting for processes to exit. Mar 17 22:04:13.923581 systemd-logind[1193]: Removed session 6. Mar 17 22:04:14.065580 systemd[1]: Started sshd@9-10.244.26.146:22-139.178.89.65:54110.service. Mar 17 22:04:14.818260 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Mar 17 22:04:14.818706 systemd[1]: Stopped kubelet.service. Mar 17 22:04:14.821341 systemd[1]: Starting kubelet.service... Mar 17 22:04:14.965049 systemd[1]: Started kubelet.service. Mar 17 22:04:14.974995 sshd[1348]: Accepted publickey for core from 139.178.89.65 port 54110 ssh2: RSA SHA256:zyhiPLENj58svNToN4BOPPS+na2TgK0IE73Z79n4eiY Mar 17 22:04:14.977850 sshd[1348]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 22:04:14.985046 systemd-logind[1193]: New session 7 of user core. Mar 17 22:04:14.986076 systemd[1]: Started session-7.scope. Mar 17 22:04:15.058418 kubelet[1354]: E0317 22:04:15.058334 1354 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Mar 17 22:04:15.060917 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Mar 17 22:04:15.061138 systemd[1]: kubelet.service: Failed with result 'exit-code'. Mar 17 22:04:15.472251 sudo[1361]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Mar 17 22:04:15.473224 sudo[1361]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Mar 17 22:04:15.482856 dbus-daemon[1177]: \xd0Ms\xa8\x90U: received setenforce notice (enforcing=-34514208) Mar 17 22:04:15.484563 sudo[1361]: pam_unix(sudo:session): session closed for user root Mar 17 22:04:15.630066 sshd[1348]: pam_unix(sshd:session): session closed for user core Mar 17 22:04:15.634622 systemd-logind[1193]: Session 7 logged out. Waiting for processes to exit. Mar 17 22:04:15.634992 systemd[1]: sshd@9-10.244.26.146:22-139.178.89.65:54110.service: Deactivated successfully. Mar 17 22:04:15.636015 systemd[1]: session-7.scope: Deactivated successfully. Mar 17 22:04:15.637300 systemd-logind[1193]: Removed session 7. Mar 17 22:04:15.777697 systemd[1]: Started sshd@10-10.244.26.146:22-139.178.89.65:54114.service. Mar 17 22:04:16.668217 sshd[1365]: Accepted publickey for core from 139.178.89.65 port 54114 ssh2: RSA SHA256:zyhiPLENj58svNToN4BOPPS+na2TgK0IE73Z79n4eiY Mar 17 22:04:16.670760 sshd[1365]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 22:04:16.677912 systemd[1]: Started session-8.scope. Mar 17 22:04:16.679630 systemd-logind[1193]: New session 8 of user core. Mar 17 22:04:17.146456 sudo[1369]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Mar 17 22:04:17.147309 sudo[1369]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Mar 17 22:04:17.152113 sudo[1369]: pam_unix(sudo:session): session closed for user root Mar 17 22:04:17.159871 sudo[1368]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Mar 17 22:04:17.160252 sudo[1368]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Mar 17 22:04:17.174639 systemd[1]: Stopping audit-rules.service... Mar 17 22:04:17.175000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Mar 17 22:04:17.182764 kernel: kauditd_printk_skb: 178 callbacks suppressed Mar 17 22:04:17.182943 kernel: audit: type=1305 audit(1742249057.175:209): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Mar 17 22:04:17.183008 kernel: audit: type=1300 audit(1742249057.175:209): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffdf0549ba0 a2=420 a3=0 items=0 ppid=1 pid=1372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:04:17.175000 audit[1372]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffdf0549ba0 a2=420 a3=0 items=0 ppid=1 pid=1372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:04:17.183210 auditctl[1372]: No rules Mar 17 22:04:17.184226 systemd[1]: audit-rules.service: Deactivated successfully. Mar 17 22:04:17.184516 systemd[1]: Stopped audit-rules.service. Mar 17 22:04:17.191206 systemd[1]: Starting audit-rules.service... Mar 17 22:04:17.175000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Mar 17 22:04:17.200003 kernel: audit: type=1327 audit(1742249057.175:209): proctitle=2F7362696E2F617564697463746C002D44 Mar 17 22:04:17.200135 kernel: audit: type=1131 audit(1742249057.182:210): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:04:17.182000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:04:17.220245 augenrules[1389]: No rules Mar 17 22:04:17.221873 systemd[1]: Finished audit-rules.service. Mar 17 22:04:17.221000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:04:17.223789 sudo[1368]: pam_unix(sudo:session): session closed for user root Mar 17 22:04:17.230602 kernel: audit: type=1130 audit(1742249057.221:211): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:04:17.230735 kernel: audit: type=1106 audit(1742249057.222:212): pid=1368 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Mar 17 22:04:17.222000 audit[1368]: USER_END pid=1368 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Mar 17 22:04:17.222000 audit[1368]: CRED_DISP pid=1368 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Mar 17 22:04:17.242384 kernel: audit: type=1104 audit(1742249057.222:213): pid=1368 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Mar 17 22:04:17.373050 sshd[1365]: pam_unix(sshd:session): session closed for user core Mar 17 22:04:17.374000 audit[1365]: USER_END pid=1365 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:04:17.376658 systemd[1]: sshd@10-10.244.26.146:22-139.178.89.65:54114.service: Deactivated successfully. Mar 17 22:04:17.377876 systemd[1]: session-8.scope: Deactivated successfully. Mar 17 22:04:17.380089 systemd-logind[1193]: Session 8 logged out. Waiting for processes to exit. Mar 17 22:04:17.381563 systemd-logind[1193]: Removed session 8. Mar 17 22:04:17.374000 audit[1365]: CRED_DISP pid=1365 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:04:17.389205 kernel: audit: type=1106 audit(1742249057.374:214): pid=1365 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:04:17.389351 kernel: audit: type=1104 audit(1742249057.374:215): pid=1365 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:04:17.389396 kernel: audit: type=1131 audit(1742249057.374:216): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.244.26.146:22-139.178.89.65:54114 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:04:17.374000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.244.26.146:22-139.178.89.65:54114 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:04:17.522000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.244.26.146:22-139.178.89.65:54128 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:04:17.522576 systemd[1]: Started sshd@11-10.244.26.146:22-139.178.89.65:54128.service. Mar 17 22:04:17.525000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.244.26.146:22-103.212.211.155:54018 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:04:17.525302 systemd[1]: Started sshd@12-10.244.26.146:22-103.212.211.155:54018.service. Mar 17 22:04:18.267000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.244.26.146:22-143.110.184.217:44728 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:04:18.268184 systemd[1]: Started sshd@13-10.244.26.146:22-143.110.184.217:44728.service. Mar 17 22:04:18.421000 audit[1396]: USER_ACCT pid=1396 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:04:18.422767 sshd[1396]: Accepted publickey for core from 139.178.89.65 port 54128 ssh2: RSA SHA256:zyhiPLENj58svNToN4BOPPS+na2TgK0IE73Z79n4eiY Mar 17 22:04:18.423000 audit[1396]: CRED_ACQ pid=1396 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:04:18.424000 audit[1396]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffd95b48d0 a2=3 a3=0 items=0 ppid=1 pid=1396 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:04:18.424000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Mar 17 22:04:18.425508 sshd[1396]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 22:04:18.433387 systemd-logind[1193]: New session 9 of user core. Mar 17 22:04:18.433627 systemd[1]: Started session-9.scope. Mar 17 22:04:18.442000 audit[1396]: USER_START pid=1396 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:04:18.444000 audit[1403]: CRED_ACQ pid=1403 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:04:18.896000 audit[1404]: USER_ACCT pid=1404 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Mar 17 22:04:18.897697 sudo[1404]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Mar 17 22:04:18.898000 audit[1404]: CRED_REFR pid=1404 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Mar 17 22:04:18.899280 sudo[1404]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Mar 17 22:04:18.902000 audit[1404]: USER_START pid=1404 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Mar 17 22:04:18.947849 systemd[1]: Starting docker.service... Mar 17 22:04:19.012488 env[1414]: time="2025-03-17T22:04:19.012347551Z" level=info msg="Starting up" Mar 17 22:04:19.015223 env[1414]: time="2025-03-17T22:04:19.015113975Z" level=info msg="parsed scheme: \"unix\"" module=grpc Mar 17 22:04:19.015223 env[1414]: time="2025-03-17T22:04:19.015148379Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Mar 17 22:04:19.015223 env[1414]: time="2025-03-17T22:04:19.015189339Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Mar 17 22:04:19.015223 env[1414]: time="2025-03-17T22:04:19.015217200Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Mar 17 22:04:19.019130 env[1414]: time="2025-03-17T22:04:19.019094459Z" level=info msg="parsed scheme: \"unix\"" module=grpc Mar 17 22:04:19.019301 env[1414]: time="2025-03-17T22:04:19.019272933Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Mar 17 22:04:19.019459 env[1414]: time="2025-03-17T22:04:19.019428597Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Mar 17 22:04:19.019612 env[1414]: time="2025-03-17T22:04:19.019584748Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Mar 17 22:04:19.029055 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport760081285-merged.mount: Deactivated successfully. Mar 17 22:04:19.060983 env[1414]: time="2025-03-17T22:04:19.060906849Z" level=info msg="Loading containers: start." Mar 17 22:04:19.125947 sshd[1401]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.110.184.217 user=root Mar 17 22:04:19.125000 audit[1401]: USER_AUTH pid=1401 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=143.110.184.217 addr=143.110.184.217 terminal=ssh res=failed' Mar 17 22:04:19.170000 audit[1447]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1447 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 22:04:19.170000 audit[1447]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffc9aee0410 a2=0 a3=7ffc9aee03fc items=0 ppid=1414 pid=1447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:04:19.170000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Mar 17 22:04:19.174000 audit[1449]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1449 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 22:04:19.174000 audit[1449]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffcc2365480 a2=0 a3=7ffcc236546c items=0 ppid=1414 pid=1449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:04:19.174000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Mar 17 22:04:19.178000 audit[1451]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1451 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 22:04:19.178000 audit[1451]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffcb1e9d2d0 a2=0 a3=7ffcb1e9d2bc items=0 ppid=1414 pid=1451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:04:19.178000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Mar 17 22:04:19.180000 audit[1453]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1453 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 22:04:19.180000 audit[1453]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffc83eecfd0 a2=0 a3=7ffc83eecfbc items=0 ppid=1414 pid=1453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:04:19.180000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Mar 17 22:04:19.184000 audit[1455]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1455 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 22:04:19.184000 audit[1455]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd513af200 a2=0 a3=7ffd513af1ec items=0 ppid=1414 pid=1455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:04:19.184000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Mar 17 22:04:19.211000 audit[1460]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1460 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 22:04:19.211000 audit[1460]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fffc6809b40 a2=0 a3=7fffc6809b2c items=0 ppid=1414 pid=1460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:04:19.211000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Mar 17 22:04:19.226000 audit[1462]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1462 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 22:04:19.226000 audit[1462]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fffcc5779e0 a2=0 a3=7fffcc5779cc items=0 ppid=1414 pid=1462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:04:19.226000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Mar 17 22:04:19.229000 audit[1464]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1464 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 22:04:19.229000 audit[1464]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffe7d17efa0 a2=0 a3=7ffe7d17ef8c items=0 ppid=1414 pid=1464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:04:19.229000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Mar 17 22:04:19.233000 audit[1466]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1466 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 22:04:19.233000 audit[1466]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffdbcbf4760 a2=0 a3=7ffdbcbf474c items=0 ppid=1414 pid=1466 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:04:19.233000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Mar 17 22:04:19.244000 audit[1470]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1470 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 22:04:19.244000 audit[1470]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffd44a538d0 a2=0 a3=7ffd44a538bc items=0 ppid=1414 pid=1470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:04:19.244000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Mar 17 22:04:19.250000 audit[1471]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1471 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 22:04:19.250000 audit[1471]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffeaa8dc840 a2=0 a3=7ffeaa8dc82c items=0 ppid=1414 pid=1471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:04:19.250000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Mar 17 22:04:19.276595 kernel: Initializing XFRM netlink socket Mar 17 22:04:19.329185 env[1414]: time="2025-03-17T22:04:19.329129523Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Mar 17 22:04:19.376000 audit[1479]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1479 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 22:04:19.376000 audit[1479]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffde5730530 a2=0 a3=7ffde573051c items=0 ppid=1414 pid=1479 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:04:19.376000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Mar 17 22:04:19.391000 audit[1482]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1482 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 22:04:19.391000 audit[1482]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffe462b29f0 a2=0 a3=7ffe462b29dc items=0 ppid=1414 pid=1482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:04:19.391000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Mar 17 22:04:19.398000 audit[1485]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1485 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 22:04:19.398000 audit[1485]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffe64d1a1f0 a2=0 a3=7ffe64d1a1dc items=0 ppid=1414 pid=1485 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:04:19.398000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Mar 17 22:04:19.402000 audit[1487]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1487 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 22:04:19.402000 audit[1487]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffca4474310 a2=0 a3=7ffca44742fc items=0 ppid=1414 pid=1487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:04:19.402000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Mar 17 22:04:19.406000 audit[1489]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1489 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 22:04:19.406000 audit[1489]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffc1a3d8760 a2=0 a3=7ffc1a3d874c items=0 ppid=1414 pid=1489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:04:19.406000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Mar 17 22:04:19.411000 audit[1491]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1491 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 22:04:19.411000 audit[1491]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffd57927b20 a2=0 a3=7ffd57927b0c items=0 ppid=1414 pid=1491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:04:19.411000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Mar 17 22:04:19.416000 audit[1493]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1493 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 22:04:19.416000 audit[1493]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffcf4381930 a2=0 a3=7ffcf438191c items=0 ppid=1414 pid=1493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:04:19.416000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Mar 17 22:04:19.431000 audit[1496]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1496 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 22:04:19.431000 audit[1496]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffcc7c4d340 a2=0 a3=7ffcc7c4d32c items=0 ppid=1414 pid=1496 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:04:19.431000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Mar 17 22:04:19.436000 audit[1498]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1498 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 22:04:19.436000 audit[1498]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffe92ffcee0 a2=0 a3=7ffe92ffcecc items=0 ppid=1414 pid=1498 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:04:19.436000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Mar 17 22:04:19.439000 audit[1500]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1500 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 22:04:19.439000 audit[1500]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffd64fa8db0 a2=0 a3=7ffd64fa8d9c items=0 ppid=1414 pid=1500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:04:19.439000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Mar 17 22:04:19.442000 audit[1502]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1502 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 22:04:19.442000 audit[1502]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe1c684800 a2=0 a3=7ffe1c6847ec items=0 ppid=1414 pid=1502 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:04:19.442000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Mar 17 22:04:19.444581 systemd-networkd[1031]: docker0: Link UP Mar 17 22:04:19.474000 audit[1506]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1506 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 22:04:19.474000 audit[1506]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff270ba440 a2=0 a3=7fff270ba42c items=0 ppid=1414 pid=1506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:04:19.474000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Mar 17 22:04:19.480000 audit[1507]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1507 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 22:04:19.480000 audit[1507]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffeb6dd2990 a2=0 a3=7ffeb6dd297c items=0 ppid=1414 pid=1507 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:04:19.480000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Mar 17 22:04:19.481853 env[1414]: time="2025-03-17T22:04:19.481767420Z" level=info msg="Loading containers: done." Mar 17 22:04:19.501999 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck3044939814-merged.mount: Deactivated successfully. Mar 17 22:04:19.516610 env[1414]: time="2025-03-17T22:04:19.516495763Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Mar 17 22:04:19.517073 env[1414]: time="2025-03-17T22:04:19.517039683Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Mar 17 22:04:19.517301 env[1414]: time="2025-03-17T22:04:19.517272823Z" level=info msg="Daemon has completed initialization" Mar 17 22:04:19.523335 sshd[1397]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.212.211.155 user=root Mar 17 22:04:19.523000 audit[1397]: USER_AUTH pid=1397 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=103.212.211.155 addr=103.212.211.155 terminal=ssh res=failed' Mar 17 22:04:19.536759 systemd[1]: Started docker.service. Mar 17 22:04:19.536000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:04:19.548197 env[1414]: time="2025-03-17T22:04:19.547918544Z" level=info msg="API listen on /run/docker.sock" Mar 17 22:04:20.815317 env[1205]: time="2025-03-17T22:04:20.815190494Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.32.3\"" Mar 17 22:04:21.413647 sshd[1401]: Failed password for root from 143.110.184.217 port 44728 ssh2 Mar 17 22:04:21.724343 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1134572938.mount: Deactivated successfully. Mar 17 22:04:21.810787 sshd[1397]: Failed password for root from 103.212.211.155 port 54018 ssh2 Mar 17 22:04:22.331007 systemd[1]: systemd-hostnamed.service: Deactivated successfully. Mar 17 22:04:22.339119 kernel: kauditd_printk_skb: 88 callbacks suppressed Mar 17 22:04:22.339483 kernel: audit: type=1131 audit(1742249062.330:255): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:04:22.330000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:04:22.357000 audit: BPF prog-id=40 op=UNLOAD Mar 17 22:04:22.357000 audit: BPF prog-id=39 op=UNLOAD Mar 17 22:04:22.361515 kernel: audit: type=1334 audit(1742249062.357:256): prog-id=40 op=UNLOAD Mar 17 22:04:22.361642 kernel: audit: type=1334 audit(1742249062.357:257): prog-id=39 op=UNLOAD Mar 17 22:04:22.361716 kernel: audit: type=1334 audit(1742249062.357:258): prog-id=38 op=UNLOAD Mar 17 22:04:22.357000 audit: BPF prog-id=38 op=UNLOAD Mar 17 22:04:23.283715 sshd[1401]: Connection closed by authenticating user root 143.110.184.217 port 44728 [preauth] Mar 17 22:04:23.285284 systemd[1]: sshd@13-10.244.26.146:22-143.110.184.217:44728.service: Deactivated successfully. Mar 17 22:04:23.285000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.244.26.146:22-143.110.184.217:44728 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:04:23.296388 kernel: audit: type=1131 audit(1742249063.285:259): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.244.26.146:22-143.110.184.217:44728 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:04:23.509107 sshd[1397]: Received disconnect from 103.212.211.155 port 54018:11: Bye Bye [preauth] Mar 17 22:04:23.509107 sshd[1397]: Disconnected from authenticating user root 103.212.211.155 port 54018 [preauth] Mar 17 22:04:23.511748 systemd[1]: sshd@12-10.244.26.146:22-103.212.211.155:54018.service: Deactivated successfully. Mar 17 22:04:23.511000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.244.26.146:22-103.212.211.155:54018 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:04:23.519621 kernel: audit: type=1131 audit(1742249063.511:260): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.244.26.146:22-103.212.211.155:54018 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:04:24.047842 env[1205]: time="2025-03-17T22:04:24.047684647Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.32.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 22:04:24.051627 env[1205]: time="2025-03-17T22:04:24.051535251Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:f8bdc4cfa0651e2d7edb4678d2b90129aef82a19249b37dc8d4705e8bd604295,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 22:04:24.056585 env[1205]: time="2025-03-17T22:04:24.056442564Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.32.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 22:04:24.061411 env[1205]: time="2025-03-17T22:04:24.061359774Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:279e45cf07e4f56925c3c5237179eb63616788426a96e94df5fedf728b18926e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 22:04:24.062696 env[1205]: time="2025-03-17T22:04:24.062647254Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.32.3\" returns image reference \"sha256:f8bdc4cfa0651e2d7edb4678d2b90129aef82a19249b37dc8d4705e8bd604295\"" Mar 17 22:04:24.064315 env[1205]: time="2025-03-17T22:04:24.064257930Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.32.3\"" Mar 17 22:04:25.312504 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 3. Mar 17 22:04:25.312951 systemd[1]: Stopped kubelet.service. Mar 17 22:04:25.312000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:04:25.312000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:04:25.324204 systemd[1]: Starting kubelet.service... Mar 17 22:04:25.329015 kernel: audit: type=1130 audit(1742249065.312:261): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:04:25.329098 kernel: audit: type=1131 audit(1742249065.312:262): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:04:25.518000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:04:25.518805 systemd[1]: Started kubelet.service. Mar 17 22:04:25.526614 kernel: audit: type=1130 audit(1742249065.518:263): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:04:25.620478 kubelet[1550]: E0317 22:04:25.619926 1550 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Mar 17 22:04:25.626763 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Mar 17 22:04:25.627013 systemd[1]: kubelet.service: Failed with result 'exit-code'. Mar 17 22:04:25.633621 kernel: audit: type=1131 audit(1742249065.626:264): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Mar 17 22:04:25.626000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Mar 17 22:04:27.753200 env[1205]: time="2025-03-17T22:04:27.753099063Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.32.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 22:04:27.757381 env[1205]: time="2025-03-17T22:04:27.757327802Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:085818208a5213f37ef6d103caaf8e1e243816a614eb5b87a98bfffe79c687b5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 22:04:27.763388 env[1205]: time="2025-03-17T22:04:27.763315199Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.32.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 22:04:27.767240 env[1205]: time="2025-03-17T22:04:27.767181855Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:54456a96a1bbdc35dcc2e70fcc1355bf655af67694e40b650ac12e83521f6411,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 22:04:27.768559 env[1205]: time="2025-03-17T22:04:27.768493998Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.32.3\" returns image reference \"sha256:085818208a5213f37ef6d103caaf8e1e243816a614eb5b87a98bfffe79c687b5\"" Mar 17 22:04:27.769868 env[1205]: time="2025-03-17T22:04:27.769832633Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.32.3\"" Mar 17 22:04:29.241820 kernel: audit: type=1130 audit(1742249069.231:265): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.244.26.146:22-143.110.184.217:56212 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:04:29.231000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.244.26.146:22-143.110.184.217:56212 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:04:29.231922 systemd[1]: Started sshd@14-10.244.26.146:22-143.110.184.217:56212.service. Mar 17 22:04:29.999727 sshd[1557]: Invalid user ranger from 143.110.184.217 port 56212 Mar 17 22:04:30.391177 sshd[1557]: pam_faillock(sshd:auth): User unknown Mar 17 22:04:30.392527 sshd[1557]: pam_unix(sshd:auth): check pass; user unknown Mar 17 22:04:30.392623 sshd[1557]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.110.184.217 Mar 17 22:04:30.393316 sshd[1557]: pam_faillock(sshd:auth): User unknown Mar 17 22:04:30.392000 audit[1557]: USER_AUTH pid=1557 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="ranger" exe="/usr/sbin/sshd" hostname=143.110.184.217 addr=143.110.184.217 terminal=ssh res=failed' Mar 17 22:04:30.402606 kernel: audit: type=1100 audit(1742249070.392:266): pid=1557 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="ranger" exe="/usr/sbin/sshd" hostname=143.110.184.217 addr=143.110.184.217 terminal=ssh res=failed' Mar 17 22:04:30.726439 env[1205]: time="2025-03-17T22:04:30.725865038Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.32.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 22:04:30.730835 env[1205]: time="2025-03-17T22:04:30.730773450Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b4260bf5078ab1b01dd05fb05015fc436b7100b7b9b5ea738e247a86008b16b8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 22:04:30.735346 env[1205]: time="2025-03-17T22:04:30.735276525Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.32.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 22:04:30.737643 env[1205]: time="2025-03-17T22:04:30.737595883Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:aafae2e3a8d65bc6dc3a0c6095c24bc72b1ff608e1417f0f5e860ce4a61c27df,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 22:04:30.738911 env[1205]: time="2025-03-17T22:04:30.738840721Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.32.3\" returns image reference \"sha256:b4260bf5078ab1b01dd05fb05015fc436b7100b7b9b5ea738e247a86008b16b8\"" Mar 17 22:04:30.740493 env[1205]: time="2025-03-17T22:04:30.740450452Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.32.3\"" Mar 17 22:04:32.524775 sshd[1557]: Failed password for invalid user ranger from 143.110.184.217 port 56212 ssh2 Mar 17 22:04:32.811977 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount707910030.mount: Deactivated successfully. Mar 17 22:04:33.904627 env[1205]: time="2025-03-17T22:04:33.904512823Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.32.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 22:04:33.906870 env[1205]: time="2025-03-17T22:04:33.906826165Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a1ae78fd2f9d8fc345928378dc947c7f1e95f01c1a552781827071867a95d09c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 22:04:33.908839 env[1205]: time="2025-03-17T22:04:33.908798340Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.32.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 22:04:33.910398 env[1205]: time="2025-03-17T22:04:33.910361176Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:5015269547a0b7dd2c062758e9a64467b58978ff2502cad4c3f5cdf4aa554ad3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 22:04:33.911073 env[1205]: time="2025-03-17T22:04:33.911012335Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.32.3\" returns image reference \"sha256:a1ae78fd2f9d8fc345928378dc947c7f1e95f01c1a552781827071867a95d09c\"" Mar 17 22:04:33.912713 env[1205]: time="2025-03-17T22:04:33.912580001Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.3\"" Mar 17 22:04:34.450991 sshd[1557]: Connection closed by invalid user ranger 143.110.184.217 port 56212 [preauth] Mar 17 22:04:34.452434 systemd[1]: sshd@14-10.244.26.146:22-143.110.184.217:56212.service: Deactivated successfully. Mar 17 22:04:34.452000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.244.26.146:22-143.110.184.217:56212 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:04:34.460859 kernel: audit: type=1131 audit(1742249074.452:267): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.244.26.146:22-143.110.184.217:56212 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:04:34.596977 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2740780043.mount: Deactivated successfully. Mar 17 22:04:35.894097 kernel: audit: type=1130 audit(1742249075.878:268): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:04:35.894410 kernel: audit: type=1131 audit(1742249075.878:269): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:04:35.878000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:04:35.878000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:04:35.878591 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 4. Mar 17 22:04:35.879104 systemd[1]: Stopped kubelet.service. Mar 17 22:04:35.888669 systemd[1]: Starting kubelet.service... Mar 17 22:04:36.092000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:04:36.098758 kernel: audit: type=1130 audit(1742249076.092:270): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:04:36.092026 systemd[1]: Started kubelet.service. Mar 17 22:04:36.189807 kubelet[1564]: E0317 22:04:36.188979 1564 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Mar 17 22:04:36.197584 kernel: audit: type=1131 audit(1742249076.190:271): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Mar 17 22:04:36.190000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Mar 17 22:04:36.190919 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Mar 17 22:04:36.191156 systemd[1]: kubelet.service: Failed with result 'exit-code'. Mar 17 22:04:36.860761 env[1205]: time="2025-03-17T22:04:36.860641783Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 22:04:36.863405 env[1205]: time="2025-03-17T22:04:36.863350359Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 22:04:36.868649 env[1205]: time="2025-03-17T22:04:36.866010354Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 22:04:36.869940 env[1205]: time="2025-03-17T22:04:36.869882005Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:9caabbf6238b189a65d0d6e6ac138de60d6a1c419e5a341fbbb7c78382559c6e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 22:04:36.871633 env[1205]: time="2025-03-17T22:04:36.871586756Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.3\" returns image reference \"sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6\"" Mar 17 22:04:36.872907 env[1205]: time="2025-03-17T22:04:36.872871398Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\"" Mar 17 22:04:36.962626 update_engine[1195]: I0317 22:04:36.961768 1195 update_attempter.cc:509] Updating boot flags... Mar 17 22:04:37.699160 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2878115226.mount: Deactivated successfully. Mar 17 22:04:37.713479 env[1205]: time="2025-03-17T22:04:37.713391437Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 22:04:37.716404 env[1205]: time="2025-03-17T22:04:37.716352580Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 22:04:37.718642 env[1205]: time="2025-03-17T22:04:37.718593728Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 22:04:37.720823 env[1205]: time="2025-03-17T22:04:37.720784810Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:ee6521f290b2168b6e0935a181d4cff9be1ac3f505666ef0e3c98fae8199917a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 22:04:37.721693 env[1205]: time="2025-03-17T22:04:37.721654456Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\" returns image reference \"sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136\"" Mar 17 22:04:37.722770 env[1205]: time="2025-03-17T22:04:37.722697716Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.16-0\"" Mar 17 22:04:38.554658 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2380340010.mount: Deactivated successfully. Mar 17 22:04:40.201000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.244.26.146:22-143.110.184.217:33270 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:04:40.203061 systemd[1]: Started sshd@15-10.244.26.146:22-143.110.184.217:33270.service. Mar 17 22:04:40.211607 kernel: audit: type=1130 audit(1742249080.201:272): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.244.26.146:22-143.110.184.217:33270 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:04:41.216584 sshd[1586]: Invalid user red5 from 143.110.184.217 port 33270 Mar 17 22:04:41.416229 sshd[1586]: pam_faillock(sshd:auth): User unknown Mar 17 22:04:41.417213 sshd[1586]: pam_unix(sshd:auth): check pass; user unknown Mar 17 22:04:41.417308 sshd[1586]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.110.184.217 Mar 17 22:04:41.418170 sshd[1586]: pam_faillock(sshd:auth): User unknown Mar 17 22:04:41.417000 audit[1586]: USER_AUTH pid=1586 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="red5" exe="/usr/sbin/sshd" hostname=143.110.184.217 addr=143.110.184.217 terminal=ssh res=failed' Mar 17 22:04:41.426592 kernel: audit: type=1100 audit(1742249081.417:273): pid=1586 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="red5" exe="/usr/sbin/sshd" hostname=143.110.184.217 addr=143.110.184.217 terminal=ssh res=failed' Mar 17 22:04:43.393790 sshd[1586]: Failed password for invalid user red5 from 143.110.184.217 port 33270 ssh2 Mar 17 22:04:44.558205 env[1205]: time="2025-03-17T22:04:44.558091588Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.16-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 22:04:44.560560 env[1205]: time="2025-03-17T22:04:44.560500069Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 22:04:44.563456 env[1205]: time="2025-03-17T22:04:44.563416827Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.16-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 22:04:44.566293 env[1205]: time="2025-03-17T22:04:44.566253264Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:c6a9d11cc5c04b114ccdef39a9265eeef818e3d02f5359be035ae784097fdec5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 22:04:44.567826 env[1205]: time="2025-03-17T22:04:44.567758888Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.16-0\" returns image reference \"sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc\"" Mar 17 22:04:44.816724 sshd[1586]: Connection closed by invalid user red5 143.110.184.217 port 33270 [preauth] Mar 17 22:04:44.819401 systemd[1]: sshd@15-10.244.26.146:22-143.110.184.217:33270.service: Deactivated successfully. Mar 17 22:04:44.819000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.244.26.146:22-143.110.184.217:33270 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:04:44.829788 kernel: audit: type=1131 audit(1742249084.819:274): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.244.26.146:22-143.110.184.217:33270 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:04:46.392000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:04:46.393459 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 5. Mar 17 22:04:46.393789 systemd[1]: Stopped kubelet.service. Mar 17 22:04:46.401217 systemd[1]: Starting kubelet.service... Mar 17 22:04:46.407705 kernel: audit: type=1130 audit(1742249086.392:275): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:04:46.407865 kernel: audit: type=1131 audit(1742249086.392:276): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:04:46.392000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:04:46.872689 kernel: audit: type=1130 audit(1742249086.863:277): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:04:46.863000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:04:46.864614 systemd[1]: Started kubelet.service. Mar 17 22:04:46.964754 kubelet[1610]: E0317 22:04:46.964679 1610 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Mar 17 22:04:46.974002 kernel: audit: type=1131 audit(1742249086.966:278): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Mar 17 22:04:46.966000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Mar 17 22:04:46.967175 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Mar 17 22:04:46.967394 systemd[1]: kubelet.service: Failed with result 'exit-code'. Mar 17 22:04:49.074856 systemd[1]: Stopped kubelet.service. Mar 17 22:04:49.074000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:04:49.083746 kernel: audit: type=1130 audit(1742249089.074:279): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:04:49.084566 systemd[1]: Starting kubelet.service... Mar 17 22:04:49.075000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:04:49.092834 kernel: audit: type=1131 audit(1742249089.075:280): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:04:49.135136 systemd[1]: Reloading. Mar 17 22:04:49.291644 /usr/lib/systemd/system-generators/torcx-generator[1648]: time="2025-03-17T22:04:49Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" Mar 17 22:04:49.291703 /usr/lib/systemd/system-generators/torcx-generator[1648]: time="2025-03-17T22:04:49Z" level=info msg="torcx already run" Mar 17 22:04:49.400229 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Mar 17 22:04:49.400274 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Mar 17 22:04:49.429611 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Mar 17 22:04:49.540000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.550135 kernel: audit: type=1400 audit(1742249089.540:281): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.540000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.560584 kernel: audit: type=1400 audit(1742249089.540:282): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.560774 kernel: audit: type=1400 audit(1742249089.540:283): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.540000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.566145 kernel: audit: type=1400 audit(1742249089.540:284): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.540000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.540000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.540000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.540000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.540000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.540000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.547000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.547000 audit: BPF prog-id=43 op=LOAD Mar 17 22:04:49.548000 audit: BPF prog-id=41 op=UNLOAD Mar 17 22:04:49.552000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.552000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.553000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.553000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.553000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.553000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.553000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.553000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.553000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.553000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.553000 audit: BPF prog-id=44 op=LOAD Mar 17 22:04:49.553000 audit: BPF prog-id=24 op=UNLOAD Mar 17 22:04:49.556000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.556000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.556000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.556000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.556000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.556000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.556000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.556000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.556000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.559000 audit: BPF prog-id=45 op=LOAD Mar 17 22:04:49.559000 audit: BPF prog-id=25 op=UNLOAD Mar 17 22:04:49.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.564000 audit: BPF prog-id=46 op=LOAD Mar 17 22:04:49.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.565000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.565000 audit: BPF prog-id=47 op=LOAD Mar 17 22:04:49.565000 audit: BPF prog-id=26 op=UNLOAD Mar 17 22:04:49.565000 audit: BPF prog-id=27 op=UNLOAD Mar 17 22:04:49.570000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.570000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.570000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.570000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.570000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.570000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.570000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.570000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.570000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.570000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.570000 audit: BPF prog-id=48 op=LOAD Mar 17 22:04:49.570000 audit: BPF prog-id=35 op=UNLOAD Mar 17 22:04:49.571000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.571000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.571000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.571000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.571000 audit: BPF prog-id=49 op=LOAD Mar 17 22:04:49.571000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.571000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.571000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.571000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.571000 audit: BPF prog-id=50 op=LOAD Mar 17 22:04:49.571000 audit: BPF prog-id=36 op=UNLOAD Mar 17 22:04:49.571000 audit: BPF prog-id=37 op=UNLOAD Mar 17 22:04:49.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.574000 audit: BPF prog-id=51 op=LOAD Mar 17 22:04:49.574000 audit: BPF prog-id=28 op=UNLOAD Mar 17 22:04:49.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.574000 audit: BPF prog-id=52 op=LOAD Mar 17 22:04:49.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.574000 audit: BPF prog-id=53 op=LOAD Mar 17 22:04:49.574000 audit: BPF prog-id=29 op=UNLOAD Mar 17 22:04:49.574000 audit: BPF prog-id=30 op=UNLOAD Mar 17 22:04:49.575000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.575000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.575000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.575000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.575000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.575000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.575000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.575000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.575000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.575000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.575000 audit: BPF prog-id=54 op=LOAD Mar 17 22:04:49.575000 audit: BPF prog-id=34 op=UNLOAD Mar 17 22:04:49.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.576000 audit: BPF prog-id=55 op=LOAD Mar 17 22:04:49.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.576000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.576000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.576000 audit: BPF prog-id=56 op=LOAD Mar 17 22:04:49.576000 audit: BPF prog-id=31 op=UNLOAD Mar 17 22:04:49.576000 audit: BPF prog-id=32 op=UNLOAD Mar 17 22:04:49.577000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.577000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.577000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.577000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.577000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.577000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.577000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.577000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.577000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.577000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:49.577000 audit: BPF prog-id=57 op=LOAD Mar 17 22:04:49.577000 audit: BPF prog-id=33 op=UNLOAD Mar 17 22:04:49.625020 systemd[1]: kubelet.service: Control process exited, code=killed, status=15/TERM Mar 17 22:04:49.625172 systemd[1]: kubelet.service: Failed with result 'signal'. Mar 17 22:04:49.625740 systemd[1]: Stopped kubelet.service. Mar 17 22:04:49.624000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Mar 17 22:04:49.629990 systemd[1]: Starting kubelet.service... Mar 17 22:04:49.812000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:04:49.812965 systemd[1]: Started kubelet.service. Mar 17 22:04:49.939076 kubelet[1695]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Mar 17 22:04:49.940017 kubelet[1695]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. Mar 17 22:04:49.940123 kubelet[1695]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Mar 17 22:04:49.940419 kubelet[1695]: I0317 22:04:49.940366 1695 server.go:215] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Mar 17 22:04:50.492357 kubelet[1695]: I0317 22:04:50.492252 1695 server.go:520] "Kubelet version" kubeletVersion="v1.32.0" Mar 17 22:04:50.492357 kubelet[1695]: I0317 22:04:50.492316 1695 server.go:522] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Mar 17 22:04:50.492849 kubelet[1695]: I0317 22:04:50.492819 1695 server.go:954] "Client rotation is on, will bootstrap in background" Mar 17 22:04:50.552975 kubelet[1695]: E0317 22:04:50.552896 1695 certificate_manager.go:562] "Unhandled Error" err="kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post \"https://10.244.26.146:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 10.244.26.146:6443: connect: connection refused" logger="UnhandledError" Mar 17 22:04:50.556617 kubelet[1695]: I0317 22:04:50.556580 1695 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Mar 17 22:04:50.574101 kubelet[1695]: E0317 22:04:50.574043 1695 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" Mar 17 22:04:50.574407 kubelet[1695]: I0317 22:04:50.574379 1695 server.go:1421] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." Mar 17 22:04:50.581276 kubelet[1695]: I0317 22:04:50.581246 1695 server.go:772] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Mar 17 22:04:50.581978 kubelet[1695]: I0317 22:04:50.581910 1695 container_manager_linux.go:268] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Mar 17 22:04:50.582384 kubelet[1695]: I0317 22:04:50.582098 1695 container_manager_linux.go:273] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"srv-zbif7.gb1.brightbox.com","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} Mar 17 22:04:50.582788 kubelet[1695]: I0317 22:04:50.582761 1695 topology_manager.go:138] "Creating topology manager with none policy" Mar 17 22:04:50.582935 kubelet[1695]: I0317 22:04:50.582913 1695 container_manager_linux.go:304] "Creating device plugin manager" Mar 17 22:04:50.583367 kubelet[1695]: I0317 22:04:50.583342 1695 state_mem.go:36] "Initialized new in-memory state store" Mar 17 22:04:50.587742 kubelet[1695]: I0317 22:04:50.587716 1695 kubelet.go:446] "Attempting to sync node with API server" Mar 17 22:04:50.587891 kubelet[1695]: I0317 22:04:50.587866 1695 kubelet.go:341] "Adding static pod path" path="/etc/kubernetes/manifests" Mar 17 22:04:50.588063 kubelet[1695]: I0317 22:04:50.588039 1695 kubelet.go:352] "Adding apiserver pod source" Mar 17 22:04:50.588215 kubelet[1695]: I0317 22:04:50.588191 1695 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Mar 17 22:04:50.600231 kubelet[1695]: W0317 22:04:50.600030 1695 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.244.26.146:6443/api/v1/nodes?fieldSelector=metadata.name%3Dsrv-zbif7.gb1.brightbox.com&limit=500&resourceVersion=0": dial tcp 10.244.26.146:6443: connect: connection refused Mar 17 22:04:50.600366 kubelet[1695]: E0317 22:04:50.600204 1695 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://10.244.26.146:6443/api/v1/nodes?fieldSelector=metadata.name%3Dsrv-zbif7.gb1.brightbox.com&limit=500&resourceVersion=0\": dial tcp 10.244.26.146:6443: connect: connection refused" logger="UnhandledError" Mar 17 22:04:50.600436 kubelet[1695]: I0317 22:04:50.600398 1695 kuberuntime_manager.go:269] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Mar 17 22:04:50.601200 kubelet[1695]: I0317 22:04:50.601168 1695 kubelet.go:890] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Mar 17 22:04:50.602045 kubelet[1695]: W0317 22:04:50.602015 1695 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Mar 17 22:04:50.607717 kubelet[1695]: I0317 22:04:50.607655 1695 watchdog_linux.go:99] "Systemd watchdog is not enabled" Mar 17 22:04:50.607848 kubelet[1695]: I0317 22:04:50.607729 1695 server.go:1287] "Started kubelet" Mar 17 22:04:50.610000 audit[1695]: AVC avc: denied { mac_admin } for pid=1695 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:50.610000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Mar 17 22:04:50.610000 audit[1695]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00095b740 a1=c000994b40 a2=c00095b710 a3=25 items=0 ppid=1 pid=1695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:04:50.610000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Mar 17 22:04:50.610000 audit[1695]: AVC avc: denied { mac_admin } for pid=1695 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:50.610000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Mar 17 22:04:50.610000 audit[1695]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000964be0 a1=c000994b58 a2=c00095b7d0 a3=25 items=0 ppid=1 pid=1695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:04:50.610000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Mar 17 22:04:50.613224 kubelet[1695]: I0317 22:04:50.611926 1695 kubelet.go:1513] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" Mar 17 22:04:50.613224 kubelet[1695]: I0317 22:04:50.612000 1695 kubelet.go:1517] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" Mar 17 22:04:50.615682 kubelet[1695]: I0317 22:04:50.615652 1695 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Mar 17 22:04:50.619572 kubelet[1695]: W0317 22:04:50.618812 1695 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.244.26.146:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 10.244.26.146:6443: connect: connection refused Mar 17 22:04:50.619572 kubelet[1695]: E0317 22:04:50.618975 1695 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://10.244.26.146:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 10.244.26.146:6443: connect: connection refused" logger="UnhandledError" Mar 17 22:04:50.622693 kubelet[1695]: I0317 22:04:50.620075 1695 server.go:169] "Starting to listen" address="0.0.0.0" port=10250 Mar 17 22:04:50.623862 kubelet[1695]: I0317 22:04:50.623808 1695 server.go:490] "Adding debug handlers to kubelet server" Mar 17 22:04:50.625613 kubelet[1695]: I0317 22:04:50.625516 1695 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Mar 17 22:04:50.626007 kubelet[1695]: I0317 22:04:50.625942 1695 server.go:243] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Mar 17 22:04:50.626693 kubelet[1695]: I0317 22:04:50.626642 1695 volume_manager.go:297] "Starting Kubelet Volume Manager" Mar 17 22:04:50.627145 kubelet[1695]: E0317 22:04:50.627103 1695 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"srv-zbif7.gb1.brightbox.com\" not found" Mar 17 22:04:50.627670 kubelet[1695]: I0317 22:04:50.627642 1695 desired_state_of_world_populator.go:149] "Desired state populator starts to run" Mar 17 22:04:50.627775 kubelet[1695]: I0317 22:04:50.627744 1695 reconciler.go:26] "Reconciler: start to sync state" Mar 17 22:04:50.629309 kubelet[1695]: W0317 22:04:50.629245 1695 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.244.26.146:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.244.26.146:6443: connect: connection refused Mar 17 22:04:50.629417 kubelet[1695]: E0317 22:04:50.629318 1695 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://10.244.26.146:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 10.244.26.146:6443: connect: connection refused" logger="UnhandledError" Mar 17 22:04:50.629498 kubelet[1695]: E0317 22:04:50.629417 1695 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.244.26.146:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/srv-zbif7.gb1.brightbox.com?timeout=10s\": dial tcp 10.244.26.146:6443: connect: connection refused" interval="200ms" Mar 17 22:04:50.629824 kubelet[1695]: I0317 22:04:50.629788 1695 factory.go:221] Registration of the systemd container factory successfully Mar 17 22:04:50.629934 kubelet[1695]: I0317 22:04:50.629903 1695 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Mar 17 22:04:50.633136 kubelet[1695]: I0317 22:04:50.633103 1695 factory.go:221] Registration of the containerd container factory successfully Mar 17 22:04:50.638111 kubelet[1695]: I0317 22:04:50.638076 1695 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" Mar 17 22:04:50.643281 kubelet[1695]: E0317 22:04:50.641755 1695 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://10.244.26.146:6443/api/v1/namespaces/default/events\": dial tcp 10.244.26.146:6443: connect: connection refused" event="&Event{ObjectMeta:{srv-zbif7.gb1.brightbox.com.182db6512beb3c55 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:srv-zbif7.gb1.brightbox.com,UID:srv-zbif7.gb1.brightbox.com,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:srv-zbif7.gb1.brightbox.com,},FirstTimestamp:2025-03-17 22:04:50.607692885 +0000 UTC m=+0.787405565,LastTimestamp:2025-03-17 22:04:50.607692885 +0000 UTC m=+0.787405565,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:srv-zbif7.gb1.brightbox.com,}" Mar 17 22:04:50.644000 audit[1707]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1707 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 22:04:50.644000 audit[1707]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc852a46f0 a2=0 a3=7ffc852a46dc items=0 ppid=1695 pid=1707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:04:50.644000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Mar 17 22:04:50.646000 audit[1708]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1708 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 22:04:50.646000 audit[1708]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffed7deda90 a2=0 a3=7ffed7deda7c items=0 ppid=1695 pid=1708 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:04:50.646000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Mar 17 22:04:50.649000 audit[1710]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1710 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 22:04:50.649000 audit[1710]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffcdfc3a800 a2=0 a3=7ffcdfc3a7ec items=0 ppid=1695 pid=1710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:04:50.649000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Mar 17 22:04:50.652000 audit[1712]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1712 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 22:04:50.652000 audit[1712]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe3b2e41b0 a2=0 a3=7ffe3b2e419c items=0 ppid=1695 pid=1712 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:04:50.652000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Mar 17 22:04:50.658910 kubelet[1695]: E0317 22:04:50.658864 1695 kubelet.go:1561] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Mar 17 22:04:50.678000 audit[1719]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1719 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 22:04:50.678000 audit[1719]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffc40194f80 a2=0 a3=7ffc40194f6c items=0 ppid=1695 pid=1719 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:04:50.678000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Mar 17 22:04:50.684289 kubelet[1695]: I0317 22:04:50.684185 1695 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Mar 17 22:04:50.685000 audit[1721]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=1721 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 22:04:50.685000 audit[1721]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffed41d9930 a2=0 a3=7ffed41d991c items=0 ppid=1695 pid=1721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:04:50.685000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Mar 17 22:04:50.688680 kubelet[1695]: I0317 22:04:50.688600 1695 cpu_manager.go:221] "Starting CPU manager" policy="none" Mar 17 22:04:50.688680 kubelet[1695]: I0317 22:04:50.688648 1695 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" Mar 17 22:04:50.688861 kubelet[1695]: I0317 22:04:50.688703 1695 state_mem.go:36] "Initialized new in-memory state store" Mar 17 22:04:50.690314 kubelet[1695]: I0317 22:04:50.690276 1695 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Mar 17 22:04:50.690421 kubelet[1695]: I0317 22:04:50.690332 1695 status_manager.go:227] "Starting to sync pod status with apiserver" Mar 17 22:04:50.690421 kubelet[1695]: I0317 22:04:50.690372 1695 watchdog_linux.go:127] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." Mar 17 22:04:50.690421 kubelet[1695]: I0317 22:04:50.690392 1695 kubelet.go:2388] "Starting kubelet main sync loop" Mar 17 22:04:50.690609 kubelet[1695]: E0317 22:04:50.690486 1695 kubelet.go:2412] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Mar 17 22:04:50.692222 kubelet[1695]: W0317 22:04:50.692180 1695 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.244.26.146:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.244.26.146:6443: connect: connection refused Mar 17 22:04:50.692322 kubelet[1695]: E0317 22:04:50.692236 1695 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://10.244.26.146:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 10.244.26.146:6443: connect: connection refused" logger="UnhandledError" Mar 17 22:04:50.691000 audit[1723]: NETFILTER_CFG table=mangle:32 family=10 entries=1 op=nft_register_chain pid=1723 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 22:04:50.691000 audit[1723]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe069b8ab0 a2=0 a3=7ffe069b8a9c items=0 ppid=1695 pid=1723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:04:50.691000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Mar 17 22:04:50.694000 audit[1722]: NETFILTER_CFG table=mangle:33 family=2 entries=1 op=nft_register_chain pid=1722 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 22:04:50.694000 audit[1722]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffd7e393b0 a2=0 a3=7fffd7e3939c items=0 ppid=1695 pid=1722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:04:50.694000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Mar 17 22:04:50.696000 audit[1724]: NETFILTER_CFG table=nat:34 family=10 entries=2 op=nft_register_chain pid=1724 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 22:04:50.696000 audit[1724]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7fff3ca92360 a2=0 a3=7fff3ca9234c items=0 ppid=1695 pid=1724 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:04:50.696000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Mar 17 22:04:50.698906 kubelet[1695]: I0317 22:04:50.698824 1695 policy_none.go:49] "None policy: Start" Mar 17 22:04:50.698906 kubelet[1695]: I0317 22:04:50.698884 1695 memory_manager.go:186] "Starting memorymanager" policy="None" Mar 17 22:04:50.699060 kubelet[1695]: I0317 22:04:50.698921 1695 state_mem.go:35] "Initializing new in-memory state store" Mar 17 22:04:50.704000 audit[1725]: NETFILTER_CFG table=nat:35 family=2 entries=1 op=nft_register_chain pid=1725 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 22:04:50.704000 audit[1725]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd8a1080b0 a2=0 a3=7ffd8a10809c items=0 ppid=1695 pid=1725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:04:50.704000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Mar 17 22:04:50.705000 audit[1727]: NETFILTER_CFG table=filter:36 family=10 entries=2 op=nft_register_chain pid=1727 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 22:04:50.705000 audit[1727]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc45ce0ad0 a2=0 a3=7ffc45ce0abc items=0 ppid=1695 pid=1727 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:04:50.705000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Mar 17 22:04:50.707000 audit[1728]: NETFILTER_CFG table=filter:37 family=2 entries=1 op=nft_register_chain pid=1728 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 22:04:50.707000 audit[1728]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc92fb6310 a2=0 a3=7ffc92fb62fc items=0 ppid=1695 pid=1728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:04:50.707000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Mar 17 22:04:50.709384 systemd[1]: Created slice kubepods.slice. Mar 17 22:04:50.720919 systemd[1]: Created slice kubepods-burstable.slice. Mar 17 22:04:50.725448 systemd[1]: Created slice kubepods-besteffort.slice. Mar 17 22:04:50.727582 kubelet[1695]: E0317 22:04:50.727525 1695 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"srv-zbif7.gb1.brightbox.com\" not found" Mar 17 22:04:50.734261 kubelet[1695]: I0317 22:04:50.734207 1695 manager.go:519] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Mar 17 22:04:50.732000 audit[1695]: AVC avc: denied { mac_admin } for pid=1695 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:50.732000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Mar 17 22:04:50.732000 audit[1695]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000cdba70 a1=c000eaddb8 a2=c000cdba40 a3=25 items=0 ppid=1 pid=1695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:04:50.732000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Mar 17 22:04:50.734890 kubelet[1695]: I0317 22:04:50.734317 1695 server.go:94] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" Mar 17 22:04:50.734890 kubelet[1695]: I0317 22:04:50.734571 1695 eviction_manager.go:189] "Eviction manager: starting control loop" Mar 17 22:04:50.734890 kubelet[1695]: I0317 22:04:50.734609 1695 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Mar 17 22:04:50.736725 kubelet[1695]: I0317 22:04:50.735830 1695 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Mar 17 22:04:50.738631 kubelet[1695]: E0317 22:04:50.738601 1695 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" Mar 17 22:04:50.738770 kubelet[1695]: E0317 22:04:50.738680 1695 eviction_manager.go:292] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"srv-zbif7.gb1.brightbox.com\" not found" Mar 17 22:04:50.806841 systemd[1]: Created slice kubepods-burstable-pod457de56c4ae5ccf844fdb404c9cad174.slice. Mar 17 22:04:50.821956 kubelet[1695]: E0317 22:04:50.821220 1695 kubelet.go:3196] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"srv-zbif7.gb1.brightbox.com\" not found" node="srv-zbif7.gb1.brightbox.com" Mar 17 22:04:50.825235 systemd[1]: Created slice kubepods-burstable-pod7e7a10aa960a82091c2e1f00f85c5f90.slice. Mar 17 22:04:50.828650 kubelet[1695]: E0317 22:04:50.828619 1695 kubelet.go:3196] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"srv-zbif7.gb1.brightbox.com\" not found" node="srv-zbif7.gb1.brightbox.com" Mar 17 22:04:50.829138 kubelet[1695]: I0317 22:04:50.829109 1695 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/457de56c4ae5ccf844fdb404c9cad174-k8s-certs\") pod \"kube-apiserver-srv-zbif7.gb1.brightbox.com\" (UID: \"457de56c4ae5ccf844fdb404c9cad174\") " pod="kube-system/kube-apiserver-srv-zbif7.gb1.brightbox.com" Mar 17 22:04:50.829295 kubelet[1695]: I0317 22:04:50.829260 1695 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/457de56c4ae5ccf844fdb404c9cad174-usr-share-ca-certificates\") pod \"kube-apiserver-srv-zbif7.gb1.brightbox.com\" (UID: \"457de56c4ae5ccf844fdb404c9cad174\") " pod="kube-system/kube-apiserver-srv-zbif7.gb1.brightbox.com" Mar 17 22:04:50.830393 kubelet[1695]: E0317 22:04:50.830219 1695 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.244.26.146:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/srv-zbif7.gb1.brightbox.com?timeout=10s\": dial tcp 10.244.26.146:6443: connect: connection refused" interval="400ms" Mar 17 22:04:50.831807 systemd[1]: Created slice kubepods-burstable-podf2b7f1b7b25a4b7681885a4d4cb183cb.slice. Mar 17 22:04:50.832218 kubelet[1695]: I0317 22:04:50.832186 1695 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/f2b7f1b7b25a4b7681885a4d4cb183cb-kubeconfig\") pod \"kube-controller-manager-srv-zbif7.gb1.brightbox.com\" (UID: \"f2b7f1b7b25a4b7681885a4d4cb183cb\") " pod="kube-system/kube-controller-manager-srv-zbif7.gb1.brightbox.com" Mar 17 22:04:50.832364 kubelet[1695]: I0317 22:04:50.832335 1695 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/457de56c4ae5ccf844fdb404c9cad174-ca-certs\") pod \"kube-apiserver-srv-zbif7.gb1.brightbox.com\" (UID: \"457de56c4ae5ccf844fdb404c9cad174\") " pod="kube-system/kube-apiserver-srv-zbif7.gb1.brightbox.com" Mar 17 22:04:50.832510 kubelet[1695]: I0317 22:04:50.832480 1695 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/f2b7f1b7b25a4b7681885a4d4cb183cb-ca-certs\") pod \"kube-controller-manager-srv-zbif7.gb1.brightbox.com\" (UID: \"f2b7f1b7b25a4b7681885a4d4cb183cb\") " pod="kube-system/kube-controller-manager-srv-zbif7.gb1.brightbox.com" Mar 17 22:04:50.832705 kubelet[1695]: I0317 22:04:50.832676 1695 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/f2b7f1b7b25a4b7681885a4d4cb183cb-flexvolume-dir\") pod \"kube-controller-manager-srv-zbif7.gb1.brightbox.com\" (UID: \"f2b7f1b7b25a4b7681885a4d4cb183cb\") " pod="kube-system/kube-controller-manager-srv-zbif7.gb1.brightbox.com" Mar 17 22:04:50.832860 kubelet[1695]: I0317 22:04:50.832832 1695 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/f2b7f1b7b25a4b7681885a4d4cb183cb-k8s-certs\") pod \"kube-controller-manager-srv-zbif7.gb1.brightbox.com\" (UID: \"f2b7f1b7b25a4b7681885a4d4cb183cb\") " pod="kube-system/kube-controller-manager-srv-zbif7.gb1.brightbox.com" Mar 17 22:04:50.833017 kubelet[1695]: I0317 22:04:50.832986 1695 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/f2b7f1b7b25a4b7681885a4d4cb183cb-usr-share-ca-certificates\") pod \"kube-controller-manager-srv-zbif7.gb1.brightbox.com\" (UID: \"f2b7f1b7b25a4b7681885a4d4cb183cb\") " pod="kube-system/kube-controller-manager-srv-zbif7.gb1.brightbox.com" Mar 17 22:04:50.833164 kubelet[1695]: I0317 22:04:50.833136 1695 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/7e7a10aa960a82091c2e1f00f85c5f90-kubeconfig\") pod \"kube-scheduler-srv-zbif7.gb1.brightbox.com\" (UID: \"7e7a10aa960a82091c2e1f00f85c5f90\") " pod="kube-system/kube-scheduler-srv-zbif7.gb1.brightbox.com" Mar 17 22:04:50.835264 kubelet[1695]: E0317 22:04:50.835234 1695 kubelet.go:3196] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"srv-zbif7.gb1.brightbox.com\" not found" node="srv-zbif7.gb1.brightbox.com" Mar 17 22:04:50.837921 kubelet[1695]: I0317 22:04:50.837883 1695 kubelet_node_status.go:76] "Attempting to register node" node="srv-zbif7.gb1.brightbox.com" Mar 17 22:04:50.838434 kubelet[1695]: E0317 22:04:50.838380 1695 kubelet_node_status.go:108] "Unable to register node with API server" err="Post \"https://10.244.26.146:6443/api/v1/nodes\": dial tcp 10.244.26.146:6443: connect: connection refused" node="srv-zbif7.gb1.brightbox.com" Mar 17 22:04:50.864321 systemd[1]: Started sshd@16-10.244.26.146:22-143.110.184.217:48558.service. Mar 17 22:04:50.863000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.244.26.146:22-143.110.184.217:48558 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:04:51.042842 kubelet[1695]: I0317 22:04:51.042789 1695 kubelet_node_status.go:76] "Attempting to register node" node="srv-zbif7.gb1.brightbox.com" Mar 17 22:04:51.043616 kubelet[1695]: E0317 22:04:51.043277 1695 kubelet_node_status.go:108] "Unable to register node with API server" err="Post \"https://10.244.26.146:6443/api/v1/nodes\": dial tcp 10.244.26.146:6443: connect: connection refused" node="srv-zbif7.gb1.brightbox.com" Mar 17 22:04:51.128087 env[1205]: time="2025-03-17T22:04:51.127194711Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-srv-zbif7.gb1.brightbox.com,Uid:457de56c4ae5ccf844fdb404c9cad174,Namespace:kube-system,Attempt:0,}" Mar 17 22:04:51.130208 env[1205]: time="2025-03-17T22:04:51.129948935Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-srv-zbif7.gb1.brightbox.com,Uid:7e7a10aa960a82091c2e1f00f85c5f90,Namespace:kube-system,Attempt:0,}" Mar 17 22:04:51.138350 env[1205]: time="2025-03-17T22:04:51.138288901Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-srv-zbif7.gb1.brightbox.com,Uid:f2b7f1b7b25a4b7681885a4d4cb183cb,Namespace:kube-system,Attempt:0,}" Mar 17 22:04:51.231863 kubelet[1695]: E0317 22:04:51.231780 1695 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.244.26.146:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/srv-zbif7.gb1.brightbox.com?timeout=10s\": dial tcp 10.244.26.146:6443: connect: connection refused" interval="800ms" Mar 17 22:04:51.446105 kubelet[1695]: I0317 22:04:51.446063 1695 kubelet_node_status.go:76] "Attempting to register node" node="srv-zbif7.gb1.brightbox.com" Mar 17 22:04:51.447145 kubelet[1695]: E0317 22:04:51.446915 1695 kubelet_node_status.go:108] "Unable to register node with API server" err="Post \"https://10.244.26.146:6443/api/v1/nodes\": dial tcp 10.244.26.146:6443: connect: connection refused" node="srv-zbif7.gb1.brightbox.com" Mar 17 22:04:51.506496 kubelet[1695]: W0317 22:04:51.506340 1695 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.244.26.146:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.244.26.146:6443: connect: connection refused Mar 17 22:04:51.506496 kubelet[1695]: E0317 22:04:51.506463 1695 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://10.244.26.146:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 10.244.26.146:6443: connect: connection refused" logger="UnhandledError" Mar 17 22:04:51.580950 kubelet[1695]: W0317 22:04:51.580770 1695 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.244.26.146:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 10.244.26.146:6443: connect: connection refused Mar 17 22:04:51.580950 kubelet[1695]: E0317 22:04:51.580882 1695 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://10.244.26.146:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 10.244.26.146:6443: connect: connection refused" logger="UnhandledError" Mar 17 22:04:51.722388 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3167899377.mount: Deactivated successfully. Mar 17 22:04:51.730824 env[1205]: time="2025-03-17T22:04:51.730707248Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 22:04:51.737105 env[1205]: time="2025-03-17T22:04:51.736732225Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 22:04:51.741281 env[1205]: time="2025-03-17T22:04:51.741218450Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 22:04:51.744935 env[1205]: time="2025-03-17T22:04:51.744883836Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 22:04:51.747216 env[1205]: time="2025-03-17T22:04:51.747178758Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 22:04:51.751303 env[1205]: time="2025-03-17T22:04:51.751247596Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 22:04:51.754835 env[1205]: time="2025-03-17T22:04:51.754792515Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 22:04:51.756809 env[1205]: time="2025-03-17T22:04:51.756772683Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 22:04:51.760973 env[1205]: time="2025-03-17T22:04:51.760915071Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 22:04:51.762249 env[1205]: time="2025-03-17T22:04:51.762211903Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 22:04:51.780524 env[1205]: time="2025-03-17T22:04:51.780463468Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 22:04:51.787673 env[1205]: time="2025-03-17T22:04:51.787470317Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Mar 17 22:04:51.787973 env[1205]: time="2025-03-17T22:04:51.787642082Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Mar 17 22:04:51.787973 env[1205]: time="2025-03-17T22:04:51.787661134Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Mar 17 22:04:51.788717 env[1205]: time="2025-03-17T22:04:51.788676931Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 22:04:51.790231 env[1205]: time="2025-03-17T22:04:51.789385515Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/761c09e639150ac94973fc166668f359ecf0c436f6a5c3020a0c838357bdbe01 pid=1740 runtime=io.containerd.runc.v2 Mar 17 22:04:51.827911 systemd[1]: Started cri-containerd-761c09e639150ac94973fc166668f359ecf0c436f6a5c3020a0c838357bdbe01.scope. Mar 17 22:04:51.828829 kubelet[1695]: W0317 22:04:51.828464 1695 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.244.26.146:6443/api/v1/nodes?fieldSelector=metadata.name%3Dsrv-zbif7.gb1.brightbox.com&limit=500&resourceVersion=0": dial tcp 10.244.26.146:6443: connect: connection refused Mar 17 22:04:51.829150 kubelet[1695]: E0317 22:04:51.828910 1695 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://10.244.26.146:6443/api/v1/nodes?fieldSelector=metadata.name%3Dsrv-zbif7.gb1.brightbox.com&limit=500&resourceVersion=0\": dial tcp 10.244.26.146:6443: connect: connection refused" logger="UnhandledError" Mar 17 22:04:51.838221 env[1205]: time="2025-03-17T22:04:51.835179896Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Mar 17 22:04:51.838560 env[1205]: time="2025-03-17T22:04:51.838462281Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Mar 17 22:04:51.838772 env[1205]: time="2025-03-17T22:04:51.838713473Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Mar 17 22:04:51.839259 env[1205]: time="2025-03-17T22:04:51.839200509Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/82b5618e6740551edb5519dc25a9bc2f38dd8580bbb701699b498b65298b5f24 pid=1762 runtime=io.containerd.runc.v2 Mar 17 22:04:51.855678 env[1205]: time="2025-03-17T22:04:51.855580238Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Mar 17 22:04:51.857850 env[1205]: time="2025-03-17T22:04:51.855645411Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Mar 17 22:04:51.857850 env[1205]: time="2025-03-17T22:04:51.855682533Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Mar 17 22:04:51.858862 env[1205]: time="2025-03-17T22:04:51.858230594Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/9757201ec3e809b599948ab6e99c87a93973c208ad08c26631aead07411e570c pid=1787 runtime=io.containerd.runc.v2 Mar 17 22:04:51.871309 sshd[1730]: Invalid user sonar from 143.110.184.217 port 48558 Mar 17 22:04:51.876386 systemd[1]: Started cri-containerd-82b5618e6740551edb5519dc25a9bc2f38dd8580bbb701699b498b65298b5f24.scope. Mar 17 22:04:51.897989 kernel: kauditd_printk_skb: 219 callbacks suppressed Mar 17 22:04:51.898196 kernel: audit: type=1400 audit(1742249091.888:471): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:51.888000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:51.903503 kernel: audit: type=1400 audit(1742249091.888:472): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:51.888000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:51.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:51.909577 kernel: audit: type=1400 audit(1742249091.889:473): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:51.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:51.920567 kernel: audit: type=1400 audit(1742249091.889:474): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:51.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:51.927645 kernel: audit: type=1400 audit(1742249091.889:475): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:51.933817 systemd[1]: Started cri-containerd-9757201ec3e809b599948ab6e99c87a93973c208ad08c26631aead07411e570c.scope. Mar 17 22:04:51.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:51.951675 kernel: audit: type=1400 audit(1742249091.889:476): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:51.951857 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Mar 17 22:04:51.951910 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Mar 17 22:04:51.951954 kernel: audit: backlog limit exceeded Mar 17 22:04:51.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:51.958575 kernel: audit: type=1400 audit(1742249091.889:477): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:51.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:51.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:51.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:51.889000 audit: BPF prog-id=58 op=LOAD Mar 17 22:04:51.889000 audit[1754]: AVC avc: denied { bpf } for pid=1754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:51.889000 audit[1754]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1740 pid=1754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:04:51.889000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736316330396536333931353061633934393733666331363636363866 Mar 17 22:04:51.889000 audit[1754]: AVC avc: denied { perfmon } for pid=1754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:51.889000 audit[1754]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1740 pid=1754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:04:51.889000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736316330396536333931353061633934393733666331363636363866 Mar 17 22:04:51.894000 audit[1754]: AVC avc: denied { bpf } for pid=1754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:51.894000 audit[1754]: AVC avc: denied { bpf } for pid=1754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:51.894000 audit[1754]: AVC avc: denied { bpf } for pid=1754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:51.894000 audit[1754]: AVC avc: denied { perfmon } for pid=1754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:51.894000 audit[1754]: AVC avc: denied { perfmon } for pid=1754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:51.894000 audit[1754]: AVC avc: denied { perfmon } for pid=1754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:51.894000 audit[1754]: AVC avc: denied { perfmon } for pid=1754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:51.894000 audit[1754]: AVC avc: denied { perfmon } for pid=1754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:51.894000 audit[1754]: AVC avc: denied { bpf } for pid=1754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:51.894000 audit[1754]: AVC avc: denied { bpf } for pid=1754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:51.894000 audit: BPF prog-id=59 op=LOAD Mar 17 22:04:51.894000 audit[1754]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003dec70 items=0 ppid=1740 pid=1754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:04:51.894000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736316330396536333931353061633934393733666331363636363866 Mar 17 22:04:51.896000 audit[1754]: AVC avc: denied { bpf } for pid=1754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:51.896000 audit[1754]: AVC avc: denied { bpf } for pid=1754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:51.896000 audit[1754]: AVC avc: denied { perfmon } for pid=1754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:51.896000 audit[1754]: AVC avc: denied { perfmon } for pid=1754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:51.896000 audit[1754]: AVC avc: denied { perfmon } for pid=1754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:51.896000 audit[1754]: AVC avc: denied { perfmon } for pid=1754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:51.896000 audit[1754]: AVC avc: denied { perfmon } for pid=1754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:51.896000 audit[1754]: AVC avc: denied { bpf } for pid=1754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:51.896000 audit[1754]: AVC avc: denied { bpf } for pid=1754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:51.896000 audit: BPF prog-id=60 op=LOAD Mar 17 22:04:51.896000 audit[1754]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003decb8 items=0 ppid=1740 pid=1754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:04:51.896000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736316330396536333931353061633934393733666331363636363866 Mar 17 22:04:51.896000 audit: BPF prog-id=60 op=UNLOAD Mar 17 22:04:51.896000 audit: BPF prog-id=59 op=UNLOAD Mar 17 22:04:51.896000 audit[1754]: AVC avc: denied { bpf } for pid=1754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:51.896000 audit[1754]: AVC avc: denied { bpf } for pid=1754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:51.896000 audit[1754]: AVC avc: denied { bpf } for pid=1754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:51.896000 audit[1754]: AVC avc: denied { perfmon } for pid=1754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:51.896000 audit[1754]: AVC avc: denied { perfmon } for pid=1754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:51.896000 audit[1754]: AVC avc: denied { perfmon } for pid=1754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:51.896000 audit[1754]: AVC avc: denied { perfmon } for pid=1754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:51.896000 audit[1754]: AVC avc: denied { perfmon } for pid=1754 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:51.896000 audit[1754]: AVC avc: denied { bpf } for pid=1754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:51.896000 audit[1754]: AVC avc: denied { bpf } for pid=1754 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:51.896000 audit: BPF prog-id=61 op=LOAD Mar 17 22:04:51.896000 audit[1754]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003df0c8 items=0 ppid=1740 pid=1754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:04:51.896000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736316330396536333931353061633934393733666331363636363866 Mar 17 22:04:51.945000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:51.945000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:51.945000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:51.945000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:51.945000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:51.945000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:51.945000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:51.945000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:51.945000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:51.945000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:51.951000 audit[1785]: AVC avc: denied { bpf } for pid=1785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:51.951000 audit: BPF prog-id=63 op=LOAD Mar 17 22:04:51.951000 audit[1785]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003529a0 items=0 ppid=1762 pid=1785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:04:51.951000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832623536313865363734303535316564623535313964633235613962 Mar 17 22:04:51.960000 audit[1785]: AVC avc: denied { bpf } for pid=1785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:51.960000 audit[1785]: AVC avc: denied { bpf } for pid=1785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:51.960000 audit[1785]: AVC avc: denied { perfmon } for pid=1785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:51.960000 audit[1785]: AVC avc: denied { bpf } for pid=1785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:51.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:51.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:51.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:51.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:51.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:51.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:51.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:51.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:51.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:51.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:51.964000 audit: BPF prog-id=65 op=LOAD Mar 17 22:04:51.965000 audit[1810]: AVC avc: denied { bpf } for pid=1810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:51.965000 audit[1810]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1787 pid=1810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:04:51.965000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937353732303165633365383039623539393934386162366539396338 Mar 17 22:04:51.965000 audit[1810]: AVC avc: denied { perfmon } for pid=1810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:51.965000 audit[1810]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=1787 pid=1810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:04:51.965000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937353732303165633365383039623539393934386162366539396338 Mar 17 22:04:51.967000 audit[1810]: AVC avc: denied { bpf } for pid=1810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:51.967000 audit[1810]: AVC avc: denied { bpf } for pid=1810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:51.967000 audit[1810]: AVC avc: denied { bpf } for pid=1810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:51.967000 audit[1810]: AVC avc: denied { perfmon } for pid=1810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:51.967000 audit[1810]: AVC avc: denied { perfmon } for pid=1810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:51.967000 audit[1810]: AVC avc: denied { perfmon } for pid=1810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:51.967000 audit[1810]: AVC avc: denied { perfmon } for pid=1810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:51.967000 audit[1810]: AVC avc: denied { perfmon } for pid=1810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:51.967000 audit[1810]: AVC avc: denied { bpf } for pid=1810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:51.967000 audit[1810]: AVC avc: denied { bpf } for pid=1810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:51.967000 audit: BPF prog-id=66 op=LOAD Mar 17 22:04:51.967000 audit[1810]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0002875d0 items=0 ppid=1787 pid=1810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:04:51.967000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937353732303165633365383039623539393934386162366539396338 Mar 17 22:04:51.967000 audit[1810]: AVC avc: denied { bpf } for pid=1810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:51.967000 audit[1810]: AVC avc: denied { bpf } for pid=1810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:51.967000 audit[1810]: AVC avc: denied { perfmon } for pid=1810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:51.967000 audit[1810]: AVC avc: denied { perfmon } for pid=1810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:51.967000 audit[1810]: AVC avc: denied { perfmon } for pid=1810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:51.967000 audit[1810]: AVC avc: denied { perfmon } for pid=1810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:51.967000 audit[1810]: AVC avc: denied { perfmon } for pid=1810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:51.967000 audit[1810]: AVC avc: denied { bpf } for pid=1810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:51.967000 audit[1810]: AVC avc: denied { bpf } for pid=1810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:51.967000 audit: BPF prog-id=67 op=LOAD Mar 17 22:04:51.967000 audit[1810]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000287618 items=0 ppid=1787 pid=1810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:04:51.967000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937353732303165633365383039623539393934386162366539396338 Mar 17 22:04:51.967000 audit: BPF prog-id=67 op=UNLOAD Mar 17 22:04:51.967000 audit: BPF prog-id=66 op=UNLOAD Mar 17 22:04:51.967000 audit[1810]: AVC avc: denied { bpf } for pid=1810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:51.967000 audit[1810]: AVC avc: denied { bpf } for pid=1810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:51.967000 audit[1810]: AVC avc: denied { bpf } for pid=1810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:51.967000 audit[1810]: AVC avc: denied { perfmon } for pid=1810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:51.967000 audit[1810]: AVC avc: denied { perfmon } for pid=1810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:51.967000 audit[1810]: AVC avc: denied { perfmon } for pid=1810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:51.967000 audit[1810]: AVC avc: denied { perfmon } for pid=1810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:51.967000 audit[1810]: AVC avc: denied { perfmon } for pid=1810 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:51.967000 audit[1810]: AVC avc: denied { bpf } for pid=1810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:51.967000 audit[1810]: AVC avc: denied { bpf } for pid=1810 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:51.967000 audit: BPF prog-id=68 op=LOAD Mar 17 22:04:51.967000 audit[1810]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000287a28 items=0 ppid=1787 pid=1810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:04:51.967000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937353732303165633365383039623539393934386162366539396338 Mar 17 22:04:51.960000 audit[1785]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003529e8 items=0 ppid=1762 pid=1785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:04:51.960000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832623536313865363734303535316564623535313964633235613962 Mar 17 22:04:51.967000 audit: BPF prog-id=64 op=UNLOAD Mar 17 22:04:51.967000 audit: BPF prog-id=63 op=UNLOAD Mar 17 22:04:51.967000 audit[1785]: AVC avc: denied { bpf } for pid=1785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:51.967000 audit[1785]: AVC avc: denied { bpf } for pid=1785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:51.967000 audit[1785]: AVC avc: denied { bpf } for pid=1785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:51.967000 audit[1785]: AVC avc: denied { perfmon } for pid=1785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:51.967000 audit[1785]: AVC avc: denied { perfmon } for pid=1785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:51.967000 audit[1785]: AVC avc: denied { perfmon } for pid=1785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:51.967000 audit[1785]: AVC avc: denied { perfmon } for pid=1785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:51.967000 audit[1785]: AVC avc: denied { perfmon } for pid=1785 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:51.967000 audit[1785]: AVC avc: denied { bpf } for pid=1785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:51.967000 audit[1785]: AVC avc: denied { bpf } for pid=1785 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:51.967000 audit: BPF prog-id=69 op=LOAD Mar 17 22:04:51.967000 audit[1785]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000352df8 items=0 ppid=1762 pid=1785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:04:51.967000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832623536313865363734303535316564623535313964633235613962 Mar 17 22:04:52.029500 env[1205]: time="2025-03-17T22:04:52.029438157Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-srv-zbif7.gb1.brightbox.com,Uid:457de56c4ae5ccf844fdb404c9cad174,Namespace:kube-system,Attempt:0,} returns sandbox id \"761c09e639150ac94973fc166668f359ecf0c436f6a5c3020a0c838357bdbe01\"" Mar 17 22:04:52.032830 kubelet[1695]: E0317 22:04:52.032779 1695 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.244.26.146:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/srv-zbif7.gb1.brightbox.com?timeout=10s\": dial tcp 10.244.26.146:6443: connect: connection refused" interval="1.6s" Mar 17 22:04:52.048728 env[1205]: time="2025-03-17T22:04:52.048671147Z" level=info msg="CreateContainer within sandbox \"761c09e639150ac94973fc166668f359ecf0c436f6a5c3020a0c838357bdbe01\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Mar 17 22:04:52.067437 env[1205]: time="2025-03-17T22:04:52.067359456Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-srv-zbif7.gb1.brightbox.com,Uid:7e7a10aa960a82091c2e1f00f85c5f90,Namespace:kube-system,Attempt:0,} returns sandbox id \"82b5618e6740551edb5519dc25a9bc2f38dd8580bbb701699b498b65298b5f24\"" Mar 17 22:04:52.070806 env[1205]: time="2025-03-17T22:04:52.070755520Z" level=info msg="CreateContainer within sandbox \"82b5618e6740551edb5519dc25a9bc2f38dd8580bbb701699b498b65298b5f24\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Mar 17 22:04:52.089594 env[1205]: time="2025-03-17T22:04:52.087452468Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-srv-zbif7.gb1.brightbox.com,Uid:f2b7f1b7b25a4b7681885a4d4cb183cb,Namespace:kube-system,Attempt:0,} returns sandbox id \"9757201ec3e809b599948ab6e99c87a93973c208ad08c26631aead07411e570c\"" Mar 17 22:04:52.092206 env[1205]: time="2025-03-17T22:04:52.092127573Z" level=info msg="CreateContainer within sandbox \"9757201ec3e809b599948ab6e99c87a93973c208ad08c26631aead07411e570c\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Mar 17 22:04:52.095949 env[1205]: time="2025-03-17T22:04:52.095892945Z" level=info msg="CreateContainer within sandbox \"761c09e639150ac94973fc166668f359ecf0c436f6a5c3020a0c838357bdbe01\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"d4ec9fe843fb2e153082808989b05685330c5fd61a4f79cb6ad2626ae6ccb08e\"" Mar 17 22:04:52.097678 env[1205]: time="2025-03-17T22:04:52.097638809Z" level=info msg="StartContainer for \"d4ec9fe843fb2e153082808989b05685330c5fd61a4f79cb6ad2626ae6ccb08e\"" Mar 17 22:04:52.104506 env[1205]: time="2025-03-17T22:04:52.104437896Z" level=info msg="CreateContainer within sandbox \"82b5618e6740551edb5519dc25a9bc2f38dd8580bbb701699b498b65298b5f24\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"0f1f21007174685402d749d5d6cce6a0f560eeda186887eadeba8d10917b6a36\"" Mar 17 22:04:52.105538 env[1205]: time="2025-03-17T22:04:52.105502886Z" level=info msg="StartContainer for \"0f1f21007174685402d749d5d6cce6a0f560eeda186887eadeba8d10917b6a36\"" Mar 17 22:04:52.112784 env[1205]: time="2025-03-17T22:04:52.112726749Z" level=info msg="CreateContainer within sandbox \"9757201ec3e809b599948ab6e99c87a93973c208ad08c26631aead07411e570c\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"2e6ab9e2f13f64eaf2164e0d9dab8381497e181fc9fc77b103d8f651f360413d\"" Mar 17 22:04:52.113666 env[1205]: time="2025-03-17T22:04:52.113629321Z" level=info msg="StartContainer for \"2e6ab9e2f13f64eaf2164e0d9dab8381497e181fc9fc77b103d8f651f360413d\"" Mar 17 22:04:52.137929 systemd[1]: Started cri-containerd-d4ec9fe843fb2e153082808989b05685330c5fd61a4f79cb6ad2626ae6ccb08e.scope. Mar 17 22:04:52.155765 systemd[1]: Started cri-containerd-0f1f21007174685402d749d5d6cce6a0f560eeda186887eadeba8d10917b6a36.scope. Mar 17 22:04:52.162087 systemd[1]: Started cri-containerd-2e6ab9e2f13f64eaf2164e0d9dab8381497e181fc9fc77b103d8f651f360413d.scope. Mar 17 22:04:52.165843 sshd[1730]: pam_faillock(sshd:auth): User unknown Mar 17 22:04:52.170668 sshd[1730]: pam_unix(sshd:auth): check pass; user unknown Mar 17 22:04:52.170744 sshd[1730]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.110.184.217 Mar 17 22:04:52.173742 sshd[1730]: pam_faillock(sshd:auth): User unknown Mar 17 22:04:52.172000 audit[1730]: USER_AUTH pid=1730 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="sonar" exe="/usr/sbin/sshd" hostname=143.110.184.217 addr=143.110.184.217 terminal=ssh res=failed' Mar 17 22:04:52.186905 kubelet[1695]: W0317 22:04:52.186846 1695 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.244.26.146:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.244.26.146:6443: connect: connection refused Mar 17 22:04:52.187442 kubelet[1695]: E0317 22:04:52.186919 1695 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://10.244.26.146:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 10.244.26.146:6443: connect: connection refused" logger="UnhandledError" Mar 17 22:04:52.198000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:52.198000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:52.198000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:52.198000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:52.198000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:52.198000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:52.198000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:52.198000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:52.198000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:52.198000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:52.198000 audit: BPF prog-id=70 op=LOAD Mar 17 22:04:52.199000 audit[1876]: AVC avc: denied { bpf } for pid=1876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:52.199000 audit[1876]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1740 pid=1876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:04:52.199000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434656339666538343366623265313533303832383038393839623035 Mar 17 22:04:52.199000 audit[1876]: AVC avc: denied { perfmon } for pid=1876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:52.199000 audit[1876]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1740 pid=1876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:04:52.199000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434656339666538343366623265313533303832383038393839623035 Mar 17 22:04:52.199000 audit[1876]: AVC avc: denied { bpf } for pid=1876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:52.199000 audit[1876]: AVC avc: denied { bpf } for pid=1876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:52.199000 audit[1876]: AVC avc: denied { bpf } for pid=1876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:52.199000 audit[1876]: AVC avc: denied { perfmon } for pid=1876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:52.199000 audit[1876]: AVC avc: denied { perfmon } for pid=1876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:52.199000 audit[1876]: AVC avc: denied { perfmon } for pid=1876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:52.199000 audit[1876]: AVC avc: denied { perfmon } for pid=1876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:52.199000 audit[1876]: AVC avc: denied { perfmon } for pid=1876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:52.199000 audit[1876]: AVC avc: denied { bpf } for pid=1876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:52.199000 audit[1876]: AVC avc: denied { bpf } for pid=1876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:52.199000 audit: BPF prog-id=71 op=LOAD Mar 17 22:04:52.199000 audit[1876]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001c06f0 items=0 ppid=1740 pid=1876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:04:52.199000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434656339666538343366623265313533303832383038393839623035 Mar 17 22:04:52.199000 audit[1876]: AVC avc: denied { bpf } for pid=1876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:52.199000 audit[1876]: AVC avc: denied { bpf } for pid=1876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:52.199000 audit[1876]: AVC avc: denied { perfmon } for pid=1876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:52.199000 audit[1876]: AVC avc: denied { perfmon } for pid=1876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:52.199000 audit[1876]: AVC avc: denied { perfmon } for pid=1876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:52.199000 audit[1876]: AVC avc: denied { perfmon } for pid=1876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:52.199000 audit[1876]: AVC avc: denied { perfmon } for pid=1876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:52.199000 audit[1876]: AVC avc: denied { bpf } for pid=1876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:52.199000 audit[1876]: AVC avc: denied { bpf } for pid=1876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:52.199000 audit: BPF prog-id=72 op=LOAD Mar 17 22:04:52.199000 audit[1876]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001c0738 items=0 ppid=1740 pid=1876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:04:52.199000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434656339666538343366623265313533303832383038393839623035 Mar 17 22:04:52.199000 audit: BPF prog-id=72 op=UNLOAD Mar 17 22:04:52.199000 audit: BPF prog-id=71 op=UNLOAD Mar 17 22:04:52.199000 audit[1876]: AVC avc: denied { bpf } for pid=1876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:52.199000 audit[1876]: AVC avc: denied { bpf } for pid=1876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:52.199000 audit[1876]: AVC avc: denied { bpf } for pid=1876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:52.199000 audit[1876]: AVC avc: denied { perfmon } for pid=1876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:52.199000 audit[1876]: AVC avc: denied { perfmon } for pid=1876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:52.199000 audit[1876]: AVC avc: denied { perfmon } for pid=1876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:52.199000 audit[1876]: AVC avc: denied { perfmon } for pid=1876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:52.199000 audit[1876]: AVC avc: denied { perfmon } for pid=1876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:52.199000 audit[1876]: AVC avc: denied { bpf } for pid=1876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:52.199000 audit[1876]: AVC avc: denied { bpf } for pid=1876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:52.199000 audit: BPF prog-id=73 op=LOAD Mar 17 22:04:52.199000 audit[1876]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001c0b48 items=0 ppid=1740 pid=1876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:04:52.199000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434656339666538343366623265313533303832383038393839623035 Mar 17 22:04:52.206000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:52.206000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:52.206000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:52.206000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:52.206000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:52.206000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:52.206000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:52.206000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:52.206000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:52.206000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:52.206000 audit: BPF prog-id=74 op=LOAD Mar 17 22:04:52.212000 audit[1880]: AVC avc: denied { bpf } for pid=1880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:52.212000 audit[1880]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1762 pid=1880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:04:52.212000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066316632313030373137343638353430326437343964356436636365 Mar 17 22:04:52.213000 audit[1880]: AVC avc: denied { perfmon } for pid=1880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:52.213000 audit[1880]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=1762 pid=1880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:04:52.213000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066316632313030373137343638353430326437343964356436636365 Mar 17 22:04:52.214000 audit[1880]: AVC avc: denied { bpf } for pid=1880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:52.214000 audit[1880]: AVC avc: denied { bpf } for pid=1880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:52.214000 audit[1880]: AVC avc: denied { bpf } for pid=1880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:52.214000 audit[1880]: AVC avc: denied { perfmon } for pid=1880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:52.214000 audit[1880]: AVC avc: denied { perfmon } for pid=1880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:52.214000 audit[1880]: AVC avc: denied { perfmon } for pid=1880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:52.214000 audit[1880]: AVC avc: denied { perfmon } for pid=1880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:52.214000 audit[1880]: AVC avc: denied { perfmon } for pid=1880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:52.214000 audit[1880]: AVC avc: denied { bpf } for pid=1880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:52.214000 audit[1880]: AVC avc: denied { bpf } for pid=1880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:52.214000 audit: BPF prog-id=75 op=LOAD Mar 17 22:04:52.214000 audit[1880]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000381060 items=0 ppid=1762 pid=1880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:04:52.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:52.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:52.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:52.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:52.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:52.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:52.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:52.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:52.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:52.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:52.217000 audit: BPF prog-id=76 op=LOAD Mar 17 22:04:52.218000 audit[1901]: AVC avc: denied { bpf } for pid=1901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:52.218000 audit[1901]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=1787 pid=1901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:04:52.218000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265366162396532663133663634656166323136346530643964616238 Mar 17 22:04:52.218000 audit[1901]: AVC avc: denied { perfmon } for pid=1901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:52.218000 audit[1901]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=1787 pid=1901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:04:52.218000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265366162396532663133663634656166323136346530643964616238 Mar 17 22:04:52.218000 audit[1901]: AVC avc: denied { bpf } for pid=1901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:52.218000 audit[1901]: AVC avc: denied { bpf } for pid=1901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:52.218000 audit[1901]: AVC avc: denied { bpf } for pid=1901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:52.218000 audit[1901]: AVC avc: denied { perfmon } for pid=1901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:52.218000 audit[1901]: AVC avc: denied { perfmon } for pid=1901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:52.218000 audit[1901]: AVC avc: denied { perfmon } for pid=1901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:52.218000 audit[1901]: AVC avc: denied { perfmon } for pid=1901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:52.218000 audit[1901]: AVC avc: denied { perfmon } for pid=1901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:52.218000 audit[1901]: AVC avc: denied { bpf } for pid=1901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:52.218000 audit[1901]: AVC avc: denied { bpf } for pid=1901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:52.218000 audit: BPF prog-id=77 op=LOAD Mar 17 22:04:52.218000 audit[1901]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c000257d00 items=0 ppid=1787 pid=1901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:04:52.218000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265366162396532663133663634656166323136346530643964616238 Mar 17 22:04:52.218000 audit[1901]: AVC avc: denied { bpf } for pid=1901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:52.218000 audit[1901]: AVC avc: denied { bpf } for pid=1901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:52.218000 audit[1901]: AVC avc: denied { perfmon } for pid=1901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:52.218000 audit[1901]: AVC avc: denied { perfmon } for pid=1901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:52.218000 audit[1901]: AVC avc: denied { perfmon } for pid=1901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:52.218000 audit[1901]: AVC avc: denied { perfmon } for pid=1901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:52.218000 audit[1901]: AVC avc: denied { perfmon } for pid=1901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:52.218000 audit[1901]: AVC avc: denied { bpf } for pid=1901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:52.218000 audit[1901]: AVC avc: denied { bpf } for pid=1901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:52.218000 audit: BPF prog-id=78 op=LOAD Mar 17 22:04:52.218000 audit[1901]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c000257d48 items=0 ppid=1787 pid=1901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:04:52.218000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265366162396532663133663634656166323136346530643964616238 Mar 17 22:04:52.219000 audit: BPF prog-id=78 op=UNLOAD Mar 17 22:04:52.219000 audit: BPF prog-id=77 op=UNLOAD Mar 17 22:04:52.219000 audit[1901]: AVC avc: denied { bpf } for pid=1901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:52.219000 audit[1901]: AVC avc: denied { bpf } for pid=1901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:52.219000 audit[1901]: AVC avc: denied { bpf } for pid=1901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:52.219000 audit[1901]: AVC avc: denied { perfmon } for pid=1901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:52.219000 audit[1901]: AVC avc: denied { perfmon } for pid=1901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:52.219000 audit[1901]: AVC avc: denied { perfmon } for pid=1901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:52.219000 audit[1901]: AVC avc: denied { perfmon } for pid=1901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:52.219000 audit[1901]: AVC avc: denied { perfmon } for pid=1901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:52.219000 audit[1901]: AVC avc: denied { bpf } for pid=1901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:52.219000 audit[1901]: AVC avc: denied { bpf } for pid=1901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:52.219000 audit: BPF prog-id=79 op=LOAD Mar 17 22:04:52.219000 audit[1901]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c000342158 items=0 ppid=1787 pid=1901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:04:52.219000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265366162396532663133663634656166323136346530643964616238 Mar 17 22:04:52.214000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066316632313030373137343638353430326437343964356436636365 Mar 17 22:04:52.223000 audit[1880]: AVC avc: denied { bpf } for pid=1880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:52.223000 audit[1880]: AVC avc: denied { bpf } for pid=1880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:52.223000 audit[1880]: AVC avc: denied { perfmon } for pid=1880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:52.223000 audit[1880]: AVC avc: denied { perfmon } for pid=1880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:52.223000 audit[1880]: AVC avc: denied { perfmon } for pid=1880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:52.223000 audit[1880]: AVC avc: denied { perfmon } for pid=1880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:52.223000 audit[1880]: AVC avc: denied { perfmon } for pid=1880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:52.223000 audit[1880]: AVC avc: denied { bpf } for pid=1880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:52.223000 audit[1880]: AVC avc: denied { bpf } for pid=1880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:52.223000 audit: BPF prog-id=80 op=LOAD Mar 17 22:04:52.223000 audit[1880]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0003810a8 items=0 ppid=1762 pid=1880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:04:52.223000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066316632313030373137343638353430326437343964356436636365 Mar 17 22:04:52.224000 audit: BPF prog-id=80 op=UNLOAD Mar 17 22:04:52.224000 audit: BPF prog-id=75 op=UNLOAD Mar 17 22:04:52.224000 audit[1880]: AVC avc: denied { bpf } for pid=1880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:52.224000 audit[1880]: AVC avc: denied { bpf } for pid=1880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:52.224000 audit[1880]: AVC avc: denied { bpf } for pid=1880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:52.224000 audit[1880]: AVC avc: denied { perfmon } for pid=1880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:52.224000 audit[1880]: AVC avc: denied { perfmon } for pid=1880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:52.224000 audit[1880]: AVC avc: denied { perfmon } for pid=1880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:52.224000 audit[1880]: AVC avc: denied { perfmon } for pid=1880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:52.224000 audit[1880]: AVC avc: denied { perfmon } for pid=1880 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:52.224000 audit[1880]: AVC avc: denied { bpf } for pid=1880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:52.224000 audit[1880]: AVC avc: denied { bpf } for pid=1880 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:52.224000 audit: BPF prog-id=81 op=LOAD Mar 17 22:04:52.224000 audit[1880]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003814b8 items=0 ppid=1762 pid=1880 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:04:52.224000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066316632313030373137343638353430326437343964356436636365 Mar 17 22:04:52.252356 kubelet[1695]: I0317 22:04:52.251904 1695 kubelet_node_status.go:76] "Attempting to register node" node="srv-zbif7.gb1.brightbox.com" Mar 17 22:04:52.252607 kubelet[1695]: E0317 22:04:52.252416 1695 kubelet_node_status.go:108] "Unable to register node with API server" err="Post \"https://10.244.26.146:6443/api/v1/nodes\": dial tcp 10.244.26.146:6443: connect: connection refused" node="srv-zbif7.gb1.brightbox.com" Mar 17 22:04:52.278837 env[1205]: time="2025-03-17T22:04:52.278773145Z" level=info msg="StartContainer for \"d4ec9fe843fb2e153082808989b05685330c5fd61a4f79cb6ad2626ae6ccb08e\" returns successfully" Mar 17 22:04:52.307347 env[1205]: time="2025-03-17T22:04:52.306953376Z" level=info msg="StartContainer for \"0f1f21007174685402d749d5d6cce6a0f560eeda186887eadeba8d10917b6a36\" returns successfully" Mar 17 22:04:52.326964 env[1205]: time="2025-03-17T22:04:52.326892380Z" level=info msg="StartContainer for \"2e6ab9e2f13f64eaf2164e0d9dab8381497e181fc9fc77b103d8f651f360413d\" returns successfully" Mar 17 22:04:52.574237 kubelet[1695]: E0317 22:04:52.574033 1695 certificate_manager.go:562] "Unhandled Error" err="kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post \"https://10.244.26.146:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 10.244.26.146:6443: connect: connection refused" logger="UnhandledError" Mar 17 22:04:52.706490 kubelet[1695]: E0317 22:04:52.705983 1695 kubelet.go:3196] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"srv-zbif7.gb1.brightbox.com\" not found" node="srv-zbif7.gb1.brightbox.com" Mar 17 22:04:52.713937 kubelet[1695]: E0317 22:04:52.709452 1695 kubelet.go:3196] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"srv-zbif7.gb1.brightbox.com\" not found" node="srv-zbif7.gb1.brightbox.com" Mar 17 22:04:52.724022 kubelet[1695]: E0317 22:04:52.723790 1695 kubelet.go:3196] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"srv-zbif7.gb1.brightbox.com\" not found" node="srv-zbif7.gb1.brightbox.com" Mar 17 22:04:53.436000 audit[1929]: AVC avc: denied { watch } for pid=1929 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526382 scontext=system_u:system_r:svirt_lxc_net_t:s0:c616,c864 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 22:04:53.436000 audit[1929]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c0009860f0 a2=fc6 a3=0 items=0 ppid=1787 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c616,c864 key=(null) Mar 17 22:04:53.436000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Mar 17 22:04:53.438000 audit[1929]: AVC avc: denied { watch } for pid=1929 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526376 scontext=system_u:system_r:svirt_lxc_net_t:s0:c616,c864 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 22:04:53.438000 audit[1929]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c00036aa20 a2=fc6 a3=0 items=0 ppid=1787 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c616,c864 key=(null) Mar 17 22:04:53.438000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Mar 17 22:04:53.745121 kubelet[1695]: E0317 22:04:53.744984 1695 kubelet.go:3196] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"srv-zbif7.gb1.brightbox.com\" not found" node="srv-zbif7.gb1.brightbox.com" Mar 17 22:04:53.746140 kubelet[1695]: E0317 22:04:53.745948 1695 kubelet.go:3196] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"srv-zbif7.gb1.brightbox.com\" not found" node="srv-zbif7.gb1.brightbox.com" Mar 17 22:04:53.855995 kubelet[1695]: I0317 22:04:53.855950 1695 kubelet_node_status.go:76] "Attempting to register node" node="srv-zbif7.gb1.brightbox.com" Mar 17 22:04:54.325635 sshd[1730]: Failed password for invalid user sonar from 143.110.184.217 port 48558 ssh2 Mar 17 22:04:55.205960 sshd[1730]: Connection closed by invalid user sonar 143.110.184.217 port 48558 [preauth] Mar 17 22:04:55.207469 systemd[1]: sshd@16-10.244.26.146:22-143.110.184.217:48558.service: Deactivated successfully. Mar 17 22:04:55.207000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.244.26.146:22-143.110.184.217:48558 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:04:55.773000 audit[1916]: AVC avc: denied { watch } for pid=1916 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=526378 scontext=system_u:system_r:svirt_lxc_net_t:s0:c529,c961 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 22:04:55.773000 audit[1916]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c0041dd680 a2=fc6 a3=0 items=0 ppid=1740 pid=1916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c529,c961 key=(null) Mar 17 22:04:55.773000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E32362E313436002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Mar 17 22:04:55.773000 audit[1916]: AVC avc: denied { watch } for pid=1916 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526376 scontext=system_u:system_r:svirt_lxc_net_t:s0:c529,c961 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 22:04:55.773000 audit[1916]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=44 a1=c003380b20 a2=fc6 a3=0 items=0 ppid=1740 pid=1916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c529,c961 key=(null) Mar 17 22:04:55.773000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E32362E313436002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Mar 17 22:04:55.777000 audit[1916]: AVC avc: denied { watch } for pid=1916 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526382 scontext=system_u:system_r:svirt_lxc_net_t:s0:c529,c961 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 22:04:55.777000 audit[1916]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=49 a1=c0041dd8c0 a2=fc6 a3=0 items=0 ppid=1740 pid=1916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c529,c961 key=(null) Mar 17 22:04:55.777000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E32362E313436002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Mar 17 22:04:55.779000 audit[1916]: AVC avc: denied { watch } for pid=1916 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526376 scontext=system_u:system_r:svirt_lxc_net_t:s0:c529,c961 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 22:04:55.779000 audit[1916]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=49 a1=c003380da0 a2=fc6 a3=0 items=0 ppid=1740 pid=1916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c529,c961 key=(null) Mar 17 22:04:55.779000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E32362E313436002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Mar 17 22:04:55.780000 audit[1916]: AVC avc: denied { watch } for pid=1916 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526382 scontext=system_u:system_r:svirt_lxc_net_t:s0:c529,c961 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 22:04:55.780000 audit[1916]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=49 a1=c0041ddaa0 a2=fc6 a3=0 items=0 ppid=1740 pid=1916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c529,c961 key=(null) Mar 17 22:04:55.780000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E32362E313436002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Mar 17 22:04:55.784000 audit[1916]: AVC avc: denied { watch } for pid=1916 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=526384 scontext=system_u:system_r:svirt_lxc_net_t:s0:c529,c961 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 22:04:55.784000 audit[1916]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4e a1=c00699b230 a2=fc6 a3=0 items=0 ppid=1740 pid=1916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c529,c961 key=(null) Mar 17 22:04:55.784000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E32362E313436002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Mar 17 22:04:55.893106 kubelet[1695]: E0317 22:04:55.893056 1695 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"srv-zbif7.gb1.brightbox.com\" not found" node="srv-zbif7.gb1.brightbox.com" Mar 17 22:04:55.970271 kubelet[1695]: I0317 22:04:55.970216 1695 kubelet_node_status.go:79] "Successfully registered node" node="srv-zbif7.gb1.brightbox.com" Mar 17 22:04:56.028211 kubelet[1695]: I0317 22:04:56.027975 1695 kubelet.go:3200] "Creating a mirror pod for static pod" pod="kube-system/kube-apiserver-srv-zbif7.gb1.brightbox.com" Mar 17 22:04:56.038658 kubelet[1695]: E0317 22:04:56.038591 1695 kubelet.go:3202] "Failed creating a mirror pod" err="pods \"kube-apiserver-srv-zbif7.gb1.brightbox.com\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-apiserver-srv-zbif7.gb1.brightbox.com" Mar 17 22:04:56.038658 kubelet[1695]: I0317 22:04:56.038639 1695 kubelet.go:3200] "Creating a mirror pod for static pod" pod="kube-system/kube-controller-manager-srv-zbif7.gb1.brightbox.com" Mar 17 22:04:56.044998 kubelet[1695]: E0317 22:04:56.044938 1695 kubelet.go:3202] "Failed creating a mirror pod" err="pods \"kube-controller-manager-srv-zbif7.gb1.brightbox.com\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-controller-manager-srv-zbif7.gb1.brightbox.com" Mar 17 22:04:56.044998 kubelet[1695]: I0317 22:04:56.044988 1695 kubelet.go:3200] "Creating a mirror pod for static pod" pod="kube-system/kube-scheduler-srv-zbif7.gb1.brightbox.com" Mar 17 22:04:56.050571 kubelet[1695]: E0317 22:04:56.050506 1695 kubelet.go:3202] "Failed creating a mirror pod" err="pods \"kube-scheduler-srv-zbif7.gb1.brightbox.com\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-scheduler-srv-zbif7.gb1.brightbox.com" Mar 17 22:04:56.621337 kubelet[1695]: I0317 22:04:56.621266 1695 apiserver.go:52] "Watching apiserver" Mar 17 22:04:56.628314 kubelet[1695]: I0317 22:04:56.628254 1695 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" Mar 17 22:04:58.093984 kubelet[1695]: I0317 22:04:58.093923 1695 kubelet.go:3200] "Creating a mirror pod for static pod" pod="kube-system/kube-scheduler-srv-zbif7.gb1.brightbox.com" Mar 17 22:04:58.107668 kubelet[1695]: W0317 22:04:58.107609 1695 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Mar 17 22:04:58.349136 systemd[1]: Reloading. Mar 17 22:04:58.509927 /usr/lib/systemd/system-generators/torcx-generator[1993]: time="2025-03-17T22:04:58Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" Mar 17 22:04:58.512723 /usr/lib/systemd/system-generators/torcx-generator[1993]: time="2025-03-17T22:04:58Z" level=info msg="torcx already run" Mar 17 22:04:58.649610 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Mar 17 22:04:58.649650 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Mar 17 22:04:58.679614 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Mar 17 22:04:58.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.804641 kernel: kauditd_printk_skb: 390 callbacks suppressed Mar 17 22:04:58.804938 kernel: audit: type=1400 audit(1742249098.798:586): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.823190 kernel: audit: type=1400 audit(1742249098.798:587): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.823353 kernel: audit: type=1400 audit(1742249098.809:588): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.809000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.830751 kernel: audit: type=1400 audit(1742249098.809:589): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.838587 kernel: audit: type=1400 audit(1742249098.809:590): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.850820 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Mar 17 22:04:58.851015 kernel: audit: type=1400 audit(1742249098.809:591): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.851071 kernel: audit: audit_lost=19 audit_rate_limit=0 audit_backlog_limit=64 Mar 17 22:04:58.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.857970 kernel: audit: type=1400 audit(1742249098.809:592): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.858119 kernel: audit: backlog limit exceeded Mar 17 22:04:58.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.809000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.809000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.809000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.809000 audit: BPF prog-id=82 op=LOAD Mar 17 22:04:58.809000 audit: BPF prog-id=43 op=UNLOAD Mar 17 22:04:58.819000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.819000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.819000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.820000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.820000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.820000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.820000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.820000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.820000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.822000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.822000 audit: BPF prog-id=83 op=LOAD Mar 17 22:04:58.822000 audit: BPF prog-id=62 op=UNLOAD Mar 17 22:04:58.823000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.823000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.823000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.823000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.829000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.829000 audit: BPF prog-id=84 op=LOAD Mar 17 22:04:58.830000 audit: BPF prog-id=44 op=UNLOAD Mar 17 22:04:58.833000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.833000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.833000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.833000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.833000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.833000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.833000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.833000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.833000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.837000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.837000 audit: BPF prog-id=85 op=LOAD Mar 17 22:04:58.837000 audit: BPF prog-id=45 op=UNLOAD Mar 17 22:04:58.838000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.838000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.838000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.838000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.838000 audit: BPF prog-id=86 op=LOAD Mar 17 22:04:58.838000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.838000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.838000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.838000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.838000 audit: BPF prog-id=87 op=LOAD Mar 17 22:04:58.838000 audit: BPF prog-id=46 op=UNLOAD Mar 17 22:04:58.838000 audit: BPF prog-id=47 op=UNLOAD Mar 17 22:04:58.843000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.858000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.858000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.858000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.858000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.858000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.858000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.858000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.859000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.859000 audit: BPF prog-id=88 op=LOAD Mar 17 22:04:58.859000 audit: BPF prog-id=76 op=UNLOAD Mar 17 22:04:58.861000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.861000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.861000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.861000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.861000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.861000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.861000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.861000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.861000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.861000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.861000 audit: BPF prog-id=89 op=LOAD Mar 17 22:04:58.861000 audit: BPF prog-id=65 op=UNLOAD Mar 17 22:04:58.863000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.863000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.863000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.863000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.863000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.863000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.863000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.863000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.863000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.863000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.863000 audit: BPF prog-id=90 op=LOAD Mar 17 22:04:58.864000 audit: BPF prog-id=48 op=UNLOAD Mar 17 22:04:58.864000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.864000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.864000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.864000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.864000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.864000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.864000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.864000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.864000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.864000 audit: BPF prog-id=91 op=LOAD Mar 17 22:04:58.864000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.864000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.864000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.864000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.864000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.864000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.864000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.864000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.864000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.864000 audit: BPF prog-id=92 op=LOAD Mar 17 22:04:58.864000 audit: BPF prog-id=49 op=UNLOAD Mar 17 22:04:58.864000 audit: BPF prog-id=50 op=UNLOAD Mar 17 22:04:58.866000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.866000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.866000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.866000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.866000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.866000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.866000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.866000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.866000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.867000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.867000 audit: BPF prog-id=93 op=LOAD Mar 17 22:04:58.867000 audit: BPF prog-id=70 op=UNLOAD Mar 17 22:04:58.867000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.867000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.867000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.867000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.867000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.867000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.867000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.867000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.867000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.867000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.867000 audit: BPF prog-id=94 op=LOAD Mar 17 22:04:58.867000 audit: BPF prog-id=58 op=UNLOAD Mar 17 22:04:58.868000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.868000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.868000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.868000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.868000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.868000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.868000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.868000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.868000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.869000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.869000 audit: BPF prog-id=95 op=LOAD Mar 17 22:04:58.869000 audit: BPF prog-id=51 op=UNLOAD Mar 17 22:04:58.869000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.869000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.869000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.869000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.869000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.869000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.869000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.869000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.869000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.869000 audit: BPF prog-id=96 op=LOAD Mar 17 22:04:58.869000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.869000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.869000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.869000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.869000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.869000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.869000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.869000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.869000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.869000 audit: BPF prog-id=97 op=LOAD Mar 17 22:04:58.869000 audit: BPF prog-id=52 op=UNLOAD Mar 17 22:04:58.869000 audit: BPF prog-id=53 op=UNLOAD Mar 17 22:04:58.869000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.869000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.869000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.870000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.870000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.870000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.870000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.870000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.870000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.870000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.870000 audit: BPF prog-id=98 op=LOAD Mar 17 22:04:58.870000 audit: BPF prog-id=54 op=UNLOAD Mar 17 22:04:58.871000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.871000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.871000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.871000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.871000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.871000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.871000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.871000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.871000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.871000 audit: BPF prog-id=99 op=LOAD Mar 17 22:04:58.871000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.871000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.871000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.871000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.871000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.871000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.871000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.871000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.871000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.871000 audit: BPF prog-id=100 op=LOAD Mar 17 22:04:58.871000 audit: BPF prog-id=55 op=UNLOAD Mar 17 22:04:58.871000 audit: BPF prog-id=56 op=UNLOAD Mar 17 22:04:58.872000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.872000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.872000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.872000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.872000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.872000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.872000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.872000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.872000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.872000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.872000 audit: BPF prog-id=101 op=LOAD Mar 17 22:04:58.872000 audit: BPF prog-id=57 op=UNLOAD Mar 17 22:04:58.873000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.873000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.873000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.873000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.873000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.873000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.873000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.873000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.873000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.873000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:04:58.873000 audit: BPF prog-id=102 op=LOAD Mar 17 22:04:58.873000 audit: BPF prog-id=74 op=UNLOAD Mar 17 22:04:58.909942 systemd[1]: Stopping kubelet.service... Mar 17 22:04:58.933406 systemd[1]: kubelet.service: Deactivated successfully. Mar 17 22:04:58.933000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:04:58.934058 systemd[1]: Stopped kubelet.service. Mar 17 22:04:58.934192 systemd[1]: kubelet.service: Consumed 1.299s CPU time. Mar 17 22:04:58.938879 systemd[1]: Starting kubelet.service... Mar 17 22:04:59.894000 audit[1929]: AVC avc: denied { watch } for pid=1929 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=526409 scontext=system_u:system_r:svirt_lxc_net_t:s0:c616,c864 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Mar 17 22:04:59.894000 audit[1929]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0007f5c00 a2=fc6 a3=0 items=0 ppid=1787 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c616,c864 key=(null) Mar 17 22:04:59.894000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Mar 17 22:05:00.302001 systemd[1]: Started kubelet.service. Mar 17 22:05:00.303000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:05:00.429604 kubelet[2045]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Mar 17 22:05:00.429604 kubelet[2045]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. Mar 17 22:05:00.429604 kubelet[2045]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Mar 17 22:05:00.429604 kubelet[2045]: I0317 22:05:00.429183 2045 server.go:215] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Mar 17 22:05:00.441664 kubelet[2045]: I0317 22:05:00.441614 2045 server.go:520] "Kubelet version" kubeletVersion="v1.32.0" Mar 17 22:05:00.441926 kubelet[2045]: I0317 22:05:00.441901 2045 server.go:522] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Mar 17 22:05:00.443376 kubelet[2045]: I0317 22:05:00.443347 2045 server.go:954] "Client rotation is on, will bootstrap in background" Mar 17 22:05:00.447817 kubelet[2045]: I0317 22:05:00.447775 2045 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Mar 17 22:05:00.453909 kubelet[2045]: I0317 22:05:00.453869 2045 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Mar 17 22:05:00.476411 kubelet[2045]: E0317 22:05:00.476356 2045 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" Mar 17 22:05:00.476411 kubelet[2045]: I0317 22:05:00.476407 2045 server.go:1421] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." Mar 17 22:05:00.491915 kubelet[2045]: I0317 22:05:00.491868 2045 server.go:772] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Mar 17 22:05:00.492565 kubelet[2045]: I0317 22:05:00.492487 2045 container_manager_linux.go:268] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Mar 17 22:05:00.493155 kubelet[2045]: I0317 22:05:00.492885 2045 container_manager_linux.go:273] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"srv-zbif7.gb1.brightbox.com","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} Mar 17 22:05:00.493448 kubelet[2045]: I0317 22:05:00.493420 2045 topology_manager.go:138] "Creating topology manager with none policy" Mar 17 22:05:00.493712 kubelet[2045]: I0317 22:05:00.493688 2045 container_manager_linux.go:304] "Creating device plugin manager" Mar 17 22:05:00.493885 kubelet[2045]: I0317 22:05:00.493861 2045 state_mem.go:36] "Initialized new in-memory state store" Mar 17 22:05:00.494376 kubelet[2045]: I0317 22:05:00.494346 2045 kubelet.go:446] "Attempting to sync node with API server" Mar 17 22:05:00.494510 kubelet[2045]: I0317 22:05:00.494485 2045 kubelet.go:341] "Adding static pod path" path="/etc/kubernetes/manifests" Mar 17 22:05:00.494705 kubelet[2045]: I0317 22:05:00.494680 2045 kubelet.go:352] "Adding apiserver pod source" Mar 17 22:05:00.494916 kubelet[2045]: I0317 22:05:00.494855 2045 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Mar 17 22:05:00.507839 kubelet[2045]: I0317 22:05:00.507776 2045 kuberuntime_manager.go:269] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Mar 17 22:05:00.508758 kubelet[2045]: I0317 22:05:00.508732 2045 kubelet.go:890] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Mar 17 22:05:00.509630 kubelet[2045]: I0317 22:05:00.509607 2045 watchdog_linux.go:99] "Systemd watchdog is not enabled" Mar 17 22:05:00.509805 kubelet[2045]: I0317 22:05:00.509782 2045 server.go:1287] "Started kubelet" Mar 17 22:05:00.532000 audit[2045]: AVC avc: denied { mac_admin } for pid=2045 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:00.532000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Mar 17 22:05:00.532000 audit[2045]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0008e66c0 a1=c0009163a8 a2=c0008e6690 a3=25 items=0 ppid=1 pid=2045 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:00.532000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Mar 17 22:05:00.532000 audit[2045]: AVC avc: denied { mac_admin } for pid=2045 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:00.532000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Mar 17 22:05:00.532000 audit[2045]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0008a3dc0 a1=c0009163c0 a2=c0008e6750 a3=25 items=0 ppid=1 pid=2045 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:00.532000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Mar 17 22:05:00.533470 kubelet[2045]: I0317 22:05:00.532703 2045 kubelet.go:1513] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" Mar 17 22:05:00.533470 kubelet[2045]: I0317 22:05:00.532768 2045 kubelet.go:1517] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" Mar 17 22:05:00.533470 kubelet[2045]: I0317 22:05:00.532819 2045 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Mar 17 22:05:00.546584 kubelet[2045]: I0317 22:05:00.545883 2045 server.go:169] "Starting to listen" address="0.0.0.0" port=10250 Mar 17 22:05:00.547449 kubelet[2045]: I0317 22:05:00.547422 2045 server.go:490] "Adding debug handlers to kubelet server" Mar 17 22:05:00.555235 kubelet[2045]: I0317 22:05:00.554953 2045 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Mar 17 22:05:00.558563 kubelet[2045]: I0317 22:05:00.558503 2045 server.go:243] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Mar 17 22:05:00.559121 kubelet[2045]: I0317 22:05:00.558831 2045 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" Mar 17 22:05:00.565264 kubelet[2045]: I0317 22:05:00.565114 2045 volume_manager.go:297] "Starting Kubelet Volume Manager" Mar 17 22:05:00.566210 kubelet[2045]: E0317 22:05:00.566151 2045 kubelet_node_status.go:467] "Error getting the current node from lister" err="node \"srv-zbif7.gb1.brightbox.com\" not found" Mar 17 22:05:00.587026 kubelet[2045]: I0317 22:05:00.586951 2045 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Mar 17 22:05:00.588766 kubelet[2045]: I0317 22:05:00.588728 2045 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Mar 17 22:05:00.589021 kubelet[2045]: I0317 22:05:00.588994 2045 status_manager.go:227] "Starting to sync pod status with apiserver" Mar 17 22:05:00.589222 kubelet[2045]: I0317 22:05:00.589179 2045 watchdog_linux.go:127] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." Mar 17 22:05:00.589346 kubelet[2045]: I0317 22:05:00.589323 2045 kubelet.go:2388] "Starting kubelet main sync loop" Mar 17 22:05:00.589604 kubelet[2045]: E0317 22:05:00.589501 2045 kubelet.go:2412] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Mar 17 22:05:00.601009 kubelet[2045]: I0317 22:05:00.600972 2045 desired_state_of_world_populator.go:149] "Desired state populator starts to run" Mar 17 22:05:00.606625 kubelet[2045]: I0317 22:05:00.606587 2045 reconciler.go:26] "Reconciler: start to sync state" Mar 17 22:05:00.607430 kubelet[2045]: I0317 22:05:00.607402 2045 factory.go:221] Registration of the systemd container factory successfully Mar 17 22:05:00.607748 kubelet[2045]: I0317 22:05:00.607717 2045 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Mar 17 22:05:00.611078 kubelet[2045]: I0317 22:05:00.611031 2045 factory.go:221] Registration of the containerd container factory successfully Mar 17 22:05:00.619899 kubelet[2045]: E0317 22:05:00.619840 2045 kubelet.go:1561] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Mar 17 22:05:00.648000 audit[1929]: AVC avc: denied { watch } for pid=1929 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526376 scontext=system_u:system_r:svirt_lxc_net_t:s0:c616,c864 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 22:05:00.648000 audit[1929]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0013ff220 a2=fc6 a3=0 items=0 ppid=1787 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c616,c864 key=(null) Mar 17 22:05:00.648000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Mar 17 22:05:00.648000 audit[1929]: AVC avc: denied { watch } for pid=1929 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526376 scontext=system_u:system_r:svirt_lxc_net_t:s0:c616,c864 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 22:05:00.648000 audit[1929]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0013ff260 a2=fc6 a3=0 items=0 ppid=1787 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c616,c864 key=(null) Mar 17 22:05:00.648000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Mar 17 22:05:00.649000 audit[1929]: AVC avc: denied { watch } for pid=1929 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526376 scontext=system_u:system_r:svirt_lxc_net_t:s0:c616,c864 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 22:05:00.649000 audit[1929]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0013ff5a0 a2=fc6 a3=0 items=0 ppid=1787 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c616,c864 key=(null) Mar 17 22:05:00.649000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Mar 17 22:05:00.649000 audit[1929]: AVC avc: denied { watch } for pid=1929 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526376 scontext=system_u:system_r:svirt_lxc_net_t:s0:c616,c864 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 22:05:00.649000 audit[1929]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0013ff760 a2=fc6 a3=0 items=0 ppid=1787 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c616,c864 key=(null) Mar 17 22:05:00.649000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Mar 17 22:05:00.690153 kubelet[2045]: E0317 22:05:00.690078 2045 kubelet.go:2412] "Skipping pod synchronization" err="container runtime status check may not have completed yet" Mar 17 22:05:00.694131 kubelet[2045]: I0317 22:05:00.694094 2045 cpu_manager.go:221] "Starting CPU manager" policy="none" Mar 17 22:05:00.694479 kubelet[2045]: I0317 22:05:00.694454 2045 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" Mar 17 22:05:00.695884 kubelet[2045]: I0317 22:05:00.695854 2045 state_mem.go:36] "Initialized new in-memory state store" Mar 17 22:05:00.697005 kubelet[2045]: I0317 22:05:00.696148 2045 state_mem.go:88] "Updated default CPUSet" cpuSet="" Mar 17 22:05:00.697005 kubelet[2045]: I0317 22:05:00.696189 2045 state_mem.go:96] "Updated CPUSet assignments" assignments={} Mar 17 22:05:00.697005 kubelet[2045]: I0317 22:05:00.696237 2045 policy_none.go:49] "None policy: Start" Mar 17 22:05:00.697005 kubelet[2045]: I0317 22:05:00.696251 2045 memory_manager.go:186] "Starting memorymanager" policy="None" Mar 17 22:05:00.697005 kubelet[2045]: I0317 22:05:00.696270 2045 state_mem.go:35] "Initializing new in-memory state store" Mar 17 22:05:00.697005 kubelet[2045]: I0317 22:05:00.696694 2045 state_mem.go:75] "Updated machine memory state" Mar 17 22:05:00.705000 audit[2045]: AVC avc: denied { mac_admin } for pid=2045 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:00.705000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Mar 17 22:05:00.705000 audit[2045]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0003a5680 a1=c000d94648 a2=c0003a5620 a3=25 items=0 ppid=1 pid=2045 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:00.705000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Mar 17 22:05:00.707083 kubelet[2045]: I0317 22:05:00.705675 2045 manager.go:519] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Mar 17 22:05:00.707083 kubelet[2045]: I0317 22:05:00.705767 2045 server.go:94] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" Mar 17 22:05:00.707083 kubelet[2045]: I0317 22:05:00.706010 2045 eviction_manager.go:189] "Eviction manager: starting control loop" Mar 17 22:05:00.707083 kubelet[2045]: I0317 22:05:00.706030 2045 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Mar 17 22:05:00.708684 kubelet[2045]: I0317 22:05:00.708222 2045 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Mar 17 22:05:00.718107 kubelet[2045]: E0317 22:05:00.716729 2045 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" Mar 17 22:05:00.844507 kubelet[2045]: I0317 22:05:00.844362 2045 kubelet_node_status.go:76] "Attempting to register node" node="srv-zbif7.gb1.brightbox.com" Mar 17 22:05:00.864978 kubelet[2045]: I0317 22:05:00.864930 2045 kubelet_node_status.go:125] "Node was previously registered" node="srv-zbif7.gb1.brightbox.com" Mar 17 22:05:00.865372 kubelet[2045]: I0317 22:05:00.865347 2045 kubelet_node_status.go:79] "Successfully registered node" node="srv-zbif7.gb1.brightbox.com" Mar 17 22:05:00.892414 kubelet[2045]: I0317 22:05:00.892367 2045 kubelet.go:3200] "Creating a mirror pod for static pod" pod="kube-system/kube-apiserver-srv-zbif7.gb1.brightbox.com" Mar 17 22:05:00.898601 kubelet[2045]: I0317 22:05:00.898183 2045 kubelet.go:3200] "Creating a mirror pod for static pod" pod="kube-system/kube-scheduler-srv-zbif7.gb1.brightbox.com" Mar 17 22:05:00.898812 kubelet[2045]: I0317 22:05:00.898799 2045 kubelet.go:3200] "Creating a mirror pod for static pod" pod="kube-system/kube-controller-manager-srv-zbif7.gb1.brightbox.com" Mar 17 22:05:00.905568 kubelet[2045]: W0317 22:05:00.905119 2045 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Mar 17 22:05:00.908815 kubelet[2045]: W0317 22:05:00.908768 2045 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Mar 17 22:05:00.909320 kubelet[2045]: I0317 22:05:00.909134 2045 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/7e7a10aa960a82091c2e1f00f85c5f90-kubeconfig\") pod \"kube-scheduler-srv-zbif7.gb1.brightbox.com\" (UID: \"7e7a10aa960a82091c2e1f00f85c5f90\") " pod="kube-system/kube-scheduler-srv-zbif7.gb1.brightbox.com" Mar 17 22:05:00.909320 kubelet[2045]: I0317 22:05:00.909304 2045 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/457de56c4ae5ccf844fdb404c9cad174-k8s-certs\") pod \"kube-apiserver-srv-zbif7.gb1.brightbox.com\" (UID: \"457de56c4ae5ccf844fdb404c9cad174\") " pod="kube-system/kube-apiserver-srv-zbif7.gb1.brightbox.com" Mar 17 22:05:00.909466 kubelet[2045]: I0317 22:05:00.909384 2045 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/f2b7f1b7b25a4b7681885a4d4cb183cb-flexvolume-dir\") pod \"kube-controller-manager-srv-zbif7.gb1.brightbox.com\" (UID: \"f2b7f1b7b25a4b7681885a4d4cb183cb\") " pod="kube-system/kube-controller-manager-srv-zbif7.gb1.brightbox.com" Mar 17 22:05:00.909466 kubelet[2045]: I0317 22:05:00.909441 2045 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/f2b7f1b7b25a4b7681885a4d4cb183cb-k8s-certs\") pod \"kube-controller-manager-srv-zbif7.gb1.brightbox.com\" (UID: \"f2b7f1b7b25a4b7681885a4d4cb183cb\") " pod="kube-system/kube-controller-manager-srv-zbif7.gb1.brightbox.com" Mar 17 22:05:00.909628 kubelet[2045]: I0317 22:05:00.909508 2045 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/f2b7f1b7b25a4b7681885a4d4cb183cb-usr-share-ca-certificates\") pod \"kube-controller-manager-srv-zbif7.gb1.brightbox.com\" (UID: \"f2b7f1b7b25a4b7681885a4d4cb183cb\") " pod="kube-system/kube-controller-manager-srv-zbif7.gb1.brightbox.com" Mar 17 22:05:00.909628 kubelet[2045]: I0317 22:05:00.909615 2045 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/457de56c4ae5ccf844fdb404c9cad174-ca-certs\") pod \"kube-apiserver-srv-zbif7.gb1.brightbox.com\" (UID: \"457de56c4ae5ccf844fdb404c9cad174\") " pod="kube-system/kube-apiserver-srv-zbif7.gb1.brightbox.com" Mar 17 22:05:00.909743 kubelet[2045]: I0317 22:05:00.909716 2045 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/457de56c4ae5ccf844fdb404c9cad174-usr-share-ca-certificates\") pod \"kube-apiserver-srv-zbif7.gb1.brightbox.com\" (UID: \"457de56c4ae5ccf844fdb404c9cad174\") " pod="kube-system/kube-apiserver-srv-zbif7.gb1.brightbox.com" Mar 17 22:05:00.909867 kubelet[2045]: I0317 22:05:00.909775 2045 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/f2b7f1b7b25a4b7681885a4d4cb183cb-ca-certs\") pod \"kube-controller-manager-srv-zbif7.gb1.brightbox.com\" (UID: \"f2b7f1b7b25a4b7681885a4d4cb183cb\") " pod="kube-system/kube-controller-manager-srv-zbif7.gb1.brightbox.com" Mar 17 22:05:00.909867 kubelet[2045]: I0317 22:05:00.909807 2045 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/f2b7f1b7b25a4b7681885a4d4cb183cb-kubeconfig\") pod \"kube-controller-manager-srv-zbif7.gb1.brightbox.com\" (UID: \"f2b7f1b7b25a4b7681885a4d4cb183cb\") " pod="kube-system/kube-controller-manager-srv-zbif7.gb1.brightbox.com" Mar 17 22:05:00.913300 kubelet[2045]: W0317 22:05:00.912868 2045 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Mar 17 22:05:00.913300 kubelet[2045]: E0317 22:05:00.913061 2045 kubelet.go:3202] "Failed creating a mirror pod" err="pods \"kube-scheduler-srv-zbif7.gb1.brightbox.com\" already exists" pod="kube-system/kube-scheduler-srv-zbif7.gb1.brightbox.com" Mar 17 22:05:01.504393 kubelet[2045]: I0317 22:05:01.504321 2045 apiserver.go:52] "Watching apiserver" Mar 17 22:05:01.603255 kubelet[2045]: I0317 22:05:01.603178 2045 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" Mar 17 22:05:01.622018 kubelet[2045]: I0317 22:05:01.621969 2045 kubelet.go:3200] "Creating a mirror pod for static pod" pod="kube-system/kube-apiserver-srv-zbif7.gb1.brightbox.com" Mar 17 22:05:01.623017 kubelet[2045]: I0317 22:05:01.622978 2045 kubelet.go:3200] "Creating a mirror pod for static pod" pod="kube-system/kube-scheduler-srv-zbif7.gb1.brightbox.com" Mar 17 22:05:01.655098 kubelet[2045]: W0317 22:05:01.655038 2045 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Mar 17 22:05:01.655509 kubelet[2045]: E0317 22:05:01.655474 2045 kubelet.go:3202] "Failed creating a mirror pod" err="pods \"kube-apiserver-srv-zbif7.gb1.brightbox.com\" already exists" pod="kube-system/kube-apiserver-srv-zbif7.gb1.brightbox.com" Mar 17 22:05:01.661032 kubelet[2045]: W0317 22:05:01.660969 2045 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Mar 17 22:05:01.661458 kubelet[2045]: E0317 22:05:01.661426 2045 kubelet.go:3202] "Failed creating a mirror pod" err="pods \"kube-scheduler-srv-zbif7.gb1.brightbox.com\" already exists" pod="kube-system/kube-scheduler-srv-zbif7.gb1.brightbox.com" Mar 17 22:05:01.793341 kubelet[2045]: I0317 22:05:01.793067 2045 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-apiserver-srv-zbif7.gb1.brightbox.com" podStartSLOduration=1.7930232130000001 podStartE2EDuration="1.793023213s" podCreationTimestamp="2025-03-17 22:05:00 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-03-17 22:05:01.735788513 +0000 UTC m=+1.412163024" watchObservedRunningTime="2025-03-17 22:05:01.793023213 +0000 UTC m=+1.469397715" Mar 17 22:05:01.863420 kubelet[2045]: I0317 22:05:01.863337 2045 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-scheduler-srv-zbif7.gb1.brightbox.com" podStartSLOduration=3.863298602 podStartE2EDuration="3.863298602s" podCreationTimestamp="2025-03-17 22:04:58 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-03-17 22:05:01.79618143 +0000 UTC m=+1.472555953" watchObservedRunningTime="2025-03-17 22:05:01.863298602 +0000 UTC m=+1.539673113" Mar 17 22:05:01.941475 systemd[1]: Started sshd@17-10.244.26.146:22-143.110.184.217:37780.service. Mar 17 22:05:01.942000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.244.26.146:22-143.110.184.217:37780 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:05:02.627497 sshd[2088]: Invalid user dolphinscheduler from 143.110.184.217 port 37780 Mar 17 22:05:02.791993 sshd[2088]: pam_faillock(sshd:auth): User unknown Mar 17 22:05:02.794106 sshd[2088]: pam_unix(sshd:auth): check pass; user unknown Mar 17 22:05:02.794313 sshd[2088]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.110.184.217 Mar 17 22:05:02.795102 sshd[2088]: pam_faillock(sshd:auth): User unknown Mar 17 22:05:02.794000 audit[2088]: USER_AUTH pid=2088 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="dolphinscheduler" exe="/usr/sbin/sshd" hostname=143.110.184.217 addr=143.110.184.217 terminal=ssh res=failed' Mar 17 22:05:03.112456 kubelet[2045]: I0317 22:05:03.112135 2045 kuberuntime_manager.go:1702] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Mar 17 22:05:03.114044 env[1205]: time="2025-03-17T22:05:03.113971229Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Mar 17 22:05:03.115192 kubelet[2045]: I0317 22:05:03.114849 2045 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Mar 17 22:05:04.078105 kubelet[2045]: I0317 22:05:04.077944 2045 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-controller-manager-srv-zbif7.gb1.brightbox.com" podStartSLOduration=4.077918255 podStartE2EDuration="4.077918255s" podCreationTimestamp="2025-03-17 22:05:00 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-03-17 22:05:01.864761346 +0000 UTC m=+1.541135876" watchObservedRunningTime="2025-03-17 22:05:04.077918255 +0000 UTC m=+3.754292767" Mar 17 22:05:04.090983 systemd[1]: Created slice kubepods-besteffort-pod8b65b671_7a6a_4194_b00d_497e48e327bd.slice. Mar 17 22:05:04.149633 kubelet[2045]: I0317 22:05:04.149574 2045 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/8b65b671-7a6a-4194-b00d-497e48e327bd-xtables-lock\") pod \"kube-proxy-sm7kp\" (UID: \"8b65b671-7a6a-4194-b00d-497e48e327bd\") " pod="kube-system/kube-proxy-sm7kp" Mar 17 22:05:04.150428 kubelet[2045]: I0317 22:05:04.150395 2045 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/8b65b671-7a6a-4194-b00d-497e48e327bd-lib-modules\") pod \"kube-proxy-sm7kp\" (UID: \"8b65b671-7a6a-4194-b00d-497e48e327bd\") " pod="kube-system/kube-proxy-sm7kp" Mar 17 22:05:04.150621 kubelet[2045]: I0317 22:05:04.150592 2045 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/8b65b671-7a6a-4194-b00d-497e48e327bd-kube-proxy\") pod \"kube-proxy-sm7kp\" (UID: \"8b65b671-7a6a-4194-b00d-497e48e327bd\") " pod="kube-system/kube-proxy-sm7kp" Mar 17 22:05:04.150814 kubelet[2045]: I0317 22:05:04.150780 2045 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-v2bv5\" (UniqueName: \"kubernetes.io/projected/8b65b671-7a6a-4194-b00d-497e48e327bd-kube-api-access-v2bv5\") pod \"kube-proxy-sm7kp\" (UID: \"8b65b671-7a6a-4194-b00d-497e48e327bd\") " pod="kube-system/kube-proxy-sm7kp" Mar 17 22:05:04.277718 systemd[1]: Created slice kubepods-besteffort-pod108d3a82_1bf3_45c6_8091_dbc545fdfcf3.slice. Mar 17 22:05:04.333888 kubelet[2045]: I0317 22:05:04.333743 2045 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" Mar 17 22:05:04.351842 kubelet[2045]: I0317 22:05:04.351776 2045 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/108d3a82-1bf3-45c6-8091-dbc545fdfcf3-var-lib-calico\") pod \"tigera-operator-7d68577dc5-n9sd4\" (UID: \"108d3a82-1bf3-45c6-8091-dbc545fdfcf3\") " pod="tigera-operator/tigera-operator-7d68577dc5-n9sd4" Mar 17 22:05:04.352019 kubelet[2045]: I0317 22:05:04.351855 2045 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-jqb9w\" (UniqueName: \"kubernetes.io/projected/108d3a82-1bf3-45c6-8091-dbc545fdfcf3-kube-api-access-jqb9w\") pod \"tigera-operator-7d68577dc5-n9sd4\" (UID: \"108d3a82-1bf3-45c6-8091-dbc545fdfcf3\") " pod="tigera-operator/tigera-operator-7d68577dc5-n9sd4" Mar 17 22:05:04.403043 env[1205]: time="2025-03-17T22:05:04.402313264Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-sm7kp,Uid:8b65b671-7a6a-4194-b00d-497e48e327bd,Namespace:kube-system,Attempt:0,}" Mar 17 22:05:04.464958 env[1205]: time="2025-03-17T22:05:04.464819300Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Mar 17 22:05:04.464958 env[1205]: time="2025-03-17T22:05:04.464898488Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Mar 17 22:05:04.465453 env[1205]: time="2025-03-17T22:05:04.464916882Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Mar 17 22:05:04.465453 env[1205]: time="2025-03-17T22:05:04.465126560Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e97d5eb1f23809e895dec9112830320923f5b23727d7334ce99613520582524d pid=2105 runtime=io.containerd.runc.v2 Mar 17 22:05:04.509492 systemd[1]: Started cri-containerd-e97d5eb1f23809e895dec9112830320923f5b23727d7334ce99613520582524d.scope. Mar 17 22:05:04.519443 systemd[1]: run-containerd-runc-k8s.io-e97d5eb1f23809e895dec9112830320923f5b23727d7334ce99613520582524d-runc.OFX9wc.mount: Deactivated successfully. Mar 17 22:05:04.588425 kernel: kauditd_printk_skb: 267 callbacks suppressed Mar 17 22:05:04.588665 kernel: audit: type=1400 audit(1742249104.578:841): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:04.578000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:04.596567 kernel: audit: type=1400 audit(1742249104.578:842): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:04.578000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:04.596855 env[1205]: time="2025-03-17T22:05:04.596005779Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-7d68577dc5-n9sd4,Uid:108d3a82-1bf3-45c6-8091-dbc545fdfcf3,Namespace:tigera-operator,Attempt:0,}" Mar 17 22:05:04.578000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:04.602569 kernel: audit: type=1400 audit(1742249104.578:843): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:04.578000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:04.613409 kernel: audit: type=1400 audit(1742249104.578:844): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:04.613574 kernel: audit: type=1400 audit(1742249104.578:845): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:04.578000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:04.578000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:04.619725 kernel: audit: type=1400 audit(1742249104.578:846): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:04.578000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:04.630636 kernel: audit: type=1400 audit(1742249104.578:847): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:04.630812 kernel: audit: type=1400 audit(1742249104.578:848): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:04.578000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:04.578000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:04.639594 kernel: audit: type=1400 audit(1742249104.578:849): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:04.579000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:04.678688 kernel: audit: type=1400 audit(1742249104.579:850): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:04.579000 audit: BPF prog-id=103 op=LOAD Mar 17 22:05:04.579000 audit[2115]: AVC avc: denied { bpf } for pid=2115 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:04.579000 audit[2115]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2105 pid=2115 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:04.579000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539376435656231663233383039653839356465633931313238333033 Mar 17 22:05:04.579000 audit[2115]: AVC avc: denied { perfmon } for pid=2115 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:04.579000 audit[2115]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2105 pid=2115 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:04.579000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539376435656231663233383039653839356465633931313238333033 Mar 17 22:05:04.579000 audit[2115]: AVC avc: denied { bpf } for pid=2115 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:04.579000 audit[2115]: AVC avc: denied { bpf } for pid=2115 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:04.579000 audit[2115]: AVC avc: denied { bpf } for pid=2115 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:04.579000 audit[2115]: AVC avc: denied { perfmon } for pid=2115 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:04.579000 audit[2115]: AVC avc: denied { perfmon } for pid=2115 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:04.579000 audit[2115]: AVC avc: denied { perfmon } for pid=2115 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:04.579000 audit[2115]: AVC avc: denied { perfmon } for pid=2115 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:04.579000 audit[2115]: AVC avc: denied { perfmon } for pid=2115 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:04.579000 audit[2115]: AVC avc: denied { bpf } for pid=2115 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:04.579000 audit[2115]: AVC avc: denied { bpf } for pid=2115 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:04.579000 audit: BPF prog-id=104 op=LOAD Mar 17 22:05:04.579000 audit[2115]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0002a9d10 items=0 ppid=2105 pid=2115 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:04.579000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539376435656231663233383039653839356465633931313238333033 Mar 17 22:05:04.583000 audit[2115]: AVC avc: denied { bpf } for pid=2115 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:04.583000 audit[2115]: AVC avc: denied { bpf } for pid=2115 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:04.583000 audit[2115]: AVC avc: denied { perfmon } for pid=2115 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:04.583000 audit[2115]: AVC avc: denied { perfmon } for pid=2115 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:04.583000 audit[2115]: AVC avc: denied { perfmon } for pid=2115 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:04.583000 audit[2115]: AVC avc: denied { perfmon } for pid=2115 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:04.583000 audit[2115]: AVC avc: denied { perfmon } for pid=2115 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:04.583000 audit[2115]: AVC avc: denied { bpf } for pid=2115 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:04.583000 audit[2115]: AVC avc: denied { bpf } for pid=2115 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:04.583000 audit: BPF prog-id=105 op=LOAD Mar 17 22:05:04.583000 audit[2115]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0002a9d58 items=0 ppid=2105 pid=2115 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:04.583000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539376435656231663233383039653839356465633931313238333033 Mar 17 22:05:04.596000 audit: BPF prog-id=105 op=UNLOAD Mar 17 22:05:04.602000 audit: BPF prog-id=104 op=UNLOAD Mar 17 22:05:04.602000 audit[2115]: AVC avc: denied { bpf } for pid=2115 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:04.602000 audit[2115]: AVC avc: denied { bpf } for pid=2115 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:04.602000 audit[2115]: AVC avc: denied { bpf } for pid=2115 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:04.602000 audit[2115]: AVC avc: denied { perfmon } for pid=2115 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:04.602000 audit[2115]: AVC avc: denied { perfmon } for pid=2115 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:04.602000 audit[2115]: AVC avc: denied { perfmon } for pid=2115 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:04.602000 audit[2115]: AVC avc: denied { perfmon } for pid=2115 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:04.602000 audit[2115]: AVC avc: denied { perfmon } for pid=2115 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:04.602000 audit[2115]: AVC avc: denied { bpf } for pid=2115 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:04.602000 audit[2115]: AVC avc: denied { bpf } for pid=2115 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:04.602000 audit: BPF prog-id=106 op=LOAD Mar 17 22:05:04.602000 audit[2115]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0002fc168 items=0 ppid=2105 pid=2115 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:04.602000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539376435656231663233383039653839356465633931313238333033 Mar 17 22:05:04.715699 env[1205]: time="2025-03-17T22:05:04.715159955Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-sm7kp,Uid:8b65b671-7a6a-4194-b00d-497e48e327bd,Namespace:kube-system,Attempt:0,} returns sandbox id \"e97d5eb1f23809e895dec9112830320923f5b23727d7334ce99613520582524d\"" Mar 17 22:05:04.745730 env[1205]: time="2025-03-17T22:05:04.743477603Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Mar 17 22:05:04.745730 env[1205]: time="2025-03-17T22:05:04.743702099Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Mar 17 22:05:04.745730 env[1205]: time="2025-03-17T22:05:04.743779759Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Mar 17 22:05:04.748762 env[1205]: time="2025-03-17T22:05:04.744674700Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/01d0dbc14caade4380bfd9c5c3c85073e5c08a037c5ce05db9008d343dea53d7 pid=2154 runtime=io.containerd.runc.v2 Mar 17 22:05:04.749491 env[1205]: time="2025-03-17T22:05:04.749436504Z" level=info msg="CreateContainer within sandbox \"e97d5eb1f23809e895dec9112830320923f5b23727d7334ce99613520582524d\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Mar 17 22:05:04.769242 systemd[1]: Started cri-containerd-01d0dbc14caade4380bfd9c5c3c85073e5c08a037c5ce05db9008d343dea53d7.scope. Mar 17 22:05:04.775883 env[1205]: time="2025-03-17T22:05:04.775817626Z" level=info msg="CreateContainer within sandbox \"e97d5eb1f23809e895dec9112830320923f5b23727d7334ce99613520582524d\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"cb015a5916912bd60cfe5b053b5c9507a7b28966fbc96dfa268c056de154964a\"" Mar 17 22:05:04.779024 env[1205]: time="2025-03-17T22:05:04.778142813Z" level=info msg="StartContainer for \"cb015a5916912bd60cfe5b053b5c9507a7b28966fbc96dfa268c056de154964a\"" Mar 17 22:05:04.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:04.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:04.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:04.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:04.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:04.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:04.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:04.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:04.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:04.806000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:04.806000 audit: BPF prog-id=107 op=LOAD Mar 17 22:05:04.807000 audit[2166]: AVC avc: denied { bpf } for pid=2166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:04.807000 audit[2166]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2154 pid=2166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:04.807000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031643064626331346361616465343338306266643963356333633835 Mar 17 22:05:04.807000 audit[2166]: AVC avc: denied { perfmon } for pid=2166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:04.807000 audit[2166]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2154 pid=2166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:04.807000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031643064626331346361616465343338306266643963356333633835 Mar 17 22:05:04.807000 audit[2166]: AVC avc: denied { bpf } for pid=2166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:04.807000 audit[2166]: AVC avc: denied { bpf } for pid=2166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:04.807000 audit[2166]: AVC avc: denied { bpf } for pid=2166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:04.807000 audit[2166]: AVC avc: denied { perfmon } for pid=2166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:04.807000 audit[2166]: AVC avc: denied { perfmon } for pid=2166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:04.807000 audit[2166]: AVC avc: denied { perfmon } for pid=2166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:04.807000 audit[2166]: AVC avc: denied { perfmon } for pid=2166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:04.807000 audit[2166]: AVC avc: denied { perfmon } for pid=2166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:04.807000 audit[2166]: AVC avc: denied { bpf } for pid=2166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:04.807000 audit[2166]: AVC avc: denied { bpf } for pid=2166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:04.807000 audit: BPF prog-id=108 op=LOAD Mar 17 22:05:04.807000 audit[2166]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000216a10 items=0 ppid=2154 pid=2166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:04.807000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031643064626331346361616465343338306266643963356333633835 Mar 17 22:05:04.807000 audit[2166]: AVC avc: denied { bpf } for pid=2166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:04.807000 audit[2166]: AVC avc: denied { bpf } for pid=2166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:04.807000 audit[2166]: AVC avc: denied { perfmon } for pid=2166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:04.807000 audit[2166]: AVC avc: denied { perfmon } for pid=2166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:04.807000 audit[2166]: AVC avc: denied { perfmon } for pid=2166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:04.807000 audit[2166]: AVC avc: denied { perfmon } for pid=2166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:04.807000 audit[2166]: AVC avc: denied { perfmon } for pid=2166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:04.807000 audit[2166]: AVC avc: denied { bpf } for pid=2166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:04.807000 audit[2166]: AVC avc: denied { bpf } for pid=2166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:04.807000 audit: BPF prog-id=109 op=LOAD Mar 17 22:05:04.807000 audit[2166]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000216a58 items=0 ppid=2154 pid=2166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:04.807000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031643064626331346361616465343338306266643963356333633835 Mar 17 22:05:04.808000 audit: BPF prog-id=109 op=UNLOAD Mar 17 22:05:04.808000 audit: BPF prog-id=108 op=UNLOAD Mar 17 22:05:04.808000 audit[2166]: AVC avc: denied { bpf } for pid=2166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:04.808000 audit[2166]: AVC avc: denied { bpf } for pid=2166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:04.808000 audit[2166]: AVC avc: denied { bpf } for pid=2166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:04.808000 audit[2166]: AVC avc: denied { perfmon } for pid=2166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:04.808000 audit[2166]: AVC avc: denied { perfmon } for pid=2166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:04.808000 audit[2166]: AVC avc: denied { perfmon } for pid=2166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:04.808000 audit[2166]: AVC avc: denied { perfmon } for pid=2166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:04.808000 audit[2166]: AVC avc: denied { perfmon } for pid=2166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:04.808000 audit[2166]: AVC avc: denied { bpf } for pid=2166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:04.808000 audit[2166]: AVC avc: denied { bpf } for pid=2166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:04.808000 audit: BPF prog-id=110 op=LOAD Mar 17 22:05:04.808000 audit[2166]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000216e68 items=0 ppid=2154 pid=2166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:04.808000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031643064626331346361616465343338306266643963356333633835 Mar 17 22:05:04.817183 systemd[1]: Started cri-containerd-cb015a5916912bd60cfe5b053b5c9507a7b28966fbc96dfa268c056de154964a.scope. Mar 17 22:05:04.888000 audit[2186]: AVC avc: denied { perfmon } for pid=2186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:04.888000 audit[2186]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f4e3c3b2ba8 items=0 ppid=2105 pid=2186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:04.888000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362303135613539313639313262643630636665356230353362356339 Mar 17 22:05:04.888000 audit[2186]: AVC avc: denied { bpf } for pid=2186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:04.888000 audit[2186]: AVC avc: denied { bpf } for pid=2186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:04.888000 audit[2186]: AVC avc: denied { bpf } for pid=2186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:04.888000 audit[2186]: AVC avc: denied { perfmon } for pid=2186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:04.888000 audit[2186]: AVC avc: denied { perfmon } for pid=2186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:04.888000 audit[2186]: AVC avc: denied { perfmon } for pid=2186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:04.888000 audit[2186]: AVC avc: denied { perfmon } for pid=2186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:04.888000 audit[2186]: AVC avc: denied { perfmon } for pid=2186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:04.888000 audit[2186]: AVC avc: denied { bpf } for pid=2186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:04.888000 audit[2186]: AVC avc: denied { bpf } for pid=2186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:04.888000 audit: BPF prog-id=111 op=LOAD Mar 17 22:05:04.888000 audit[2186]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c00030e548 items=0 ppid=2105 pid=2186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:04.888000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362303135613539313639313262643630636665356230353362356339 Mar 17 22:05:04.888000 audit[2186]: AVC avc: denied { bpf } for pid=2186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:04.888000 audit[2186]: AVC avc: denied { bpf } for pid=2186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:04.888000 audit[2186]: AVC avc: denied { perfmon } for pid=2186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:04.888000 audit[2186]: AVC avc: denied { perfmon } for pid=2186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:04.888000 audit[2186]: AVC avc: denied { perfmon } for pid=2186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:04.888000 audit[2186]: AVC avc: denied { perfmon } for pid=2186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:04.888000 audit[2186]: AVC avc: denied { perfmon } for pid=2186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:04.888000 audit[2186]: AVC avc: denied { bpf } for pid=2186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:04.888000 audit[2186]: AVC avc: denied { bpf } for pid=2186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:04.888000 audit: BPF prog-id=112 op=LOAD Mar 17 22:05:04.888000 audit[2186]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c00030e598 items=0 ppid=2105 pid=2186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:04.888000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362303135613539313639313262643630636665356230353362356339 Mar 17 22:05:04.889000 audit: BPF prog-id=112 op=UNLOAD Mar 17 22:05:04.889000 audit: BPF prog-id=111 op=UNLOAD Mar 17 22:05:04.889000 audit[2186]: AVC avc: denied { bpf } for pid=2186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:04.889000 audit[2186]: AVC avc: denied { bpf } for pid=2186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:04.889000 audit[2186]: AVC avc: denied { bpf } for pid=2186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:04.889000 audit[2186]: AVC avc: denied { perfmon } for pid=2186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:04.889000 audit[2186]: AVC avc: denied { perfmon } for pid=2186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:04.889000 audit[2186]: AVC avc: denied { perfmon } for pid=2186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:04.889000 audit[2186]: AVC avc: denied { perfmon } for pid=2186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:04.889000 audit[2186]: AVC avc: denied { perfmon } for pid=2186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:04.889000 audit[2186]: AVC avc: denied { bpf } for pid=2186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:04.889000 audit[2186]: AVC avc: denied { bpf } for pid=2186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:04.889000 audit: BPF prog-id=113 op=LOAD Mar 17 22:05:04.889000 audit[2186]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c00030e628 items=0 ppid=2105 pid=2186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:04.889000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362303135613539313639313262643630636665356230353362356339 Mar 17 22:05:04.941745 env[1205]: time="2025-03-17T22:05:04.941679488Z" level=info msg="StartContainer for \"cb015a5916912bd60cfe5b053b5c9507a7b28966fbc96dfa268c056de154964a\" returns successfully" Mar 17 22:05:04.958961 env[1205]: time="2025-03-17T22:05:04.958899529Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-7d68577dc5-n9sd4,Uid:108d3a82-1bf3-45c6-8091-dbc545fdfcf3,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"01d0dbc14caade4380bfd9c5c3c85073e5c08a037c5ce05db9008d343dea53d7\"" Mar 17 22:05:04.966433 env[1205]: time="2025-03-17T22:05:04.966379567Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.2\"" Mar 17 22:05:04.986747 sshd[2088]: Failed password for invalid user dolphinscheduler from 143.110.184.217 port 37780 ssh2 Mar 17 22:05:05.287997 sshd[2088]: Connection closed by invalid user dolphinscheduler 143.110.184.217 port 37780 [preauth] Mar 17 22:05:05.289000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.244.26.146:22-143.110.184.217:37780 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:05:05.289661 systemd[1]: sshd@17-10.244.26.146:22-143.110.184.217:37780.service: Deactivated successfully. Mar 17 22:05:05.624653 sudo[1404]: pam_unix(sudo:session): session closed for user root Mar 17 22:05:05.624000 audit[1404]: USER_END pid=1404 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Mar 17 22:05:05.625000 audit[1404]: CRED_DISP pid=1404 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Mar 17 22:05:05.726000 audit[2275]: NETFILTER_CFG table=mangle:38 family=2 entries=1 op=nft_register_chain pid=2275 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 22:05:05.726000 audit[2275]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd12d59600 a2=0 a3=7ffd12d595ec items=0 ppid=2206 pid=2275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:05.726000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Mar 17 22:05:05.729000 audit[2277]: NETFILTER_CFG table=nat:39 family=2 entries=1 op=nft_register_chain pid=2277 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 22:05:05.729000 audit[2277]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc4907b150 a2=0 a3=7ffc4907b13c items=0 ppid=2206 pid=2277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:05.729000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Mar 17 22:05:05.731000 audit[2278]: NETFILTER_CFG table=filter:40 family=2 entries=1 op=nft_register_chain pid=2278 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 22:05:05.731000 audit[2278]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe50cd23b0 a2=0 a3=7ffe50cd239c items=0 ppid=2206 pid=2278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:05.731000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Mar 17 22:05:05.733000 audit[2279]: NETFILTER_CFG table=mangle:41 family=10 entries=1 op=nft_register_chain pid=2279 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 22:05:05.733000 audit[2279]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd8128b5d0 a2=0 a3=7ffd8128b5bc items=0 ppid=2206 pid=2279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:05.733000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Mar 17 22:05:05.736000 audit[2280]: NETFILTER_CFG table=nat:42 family=10 entries=1 op=nft_register_chain pid=2280 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 22:05:05.736000 audit[2280]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff34306010 a2=0 a3=7fff34305ffc items=0 ppid=2206 pid=2280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:05.736000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Mar 17 22:05:05.739000 audit[2281]: NETFILTER_CFG table=filter:43 family=10 entries=1 op=nft_register_chain pid=2281 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 22:05:05.739000 audit[2281]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd10636780 a2=0 a3=7ffd1063676c items=0 ppid=2206 pid=2281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:05.739000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Mar 17 22:05:05.774037 sshd[1396]: pam_unix(sshd:session): session closed for user core Mar 17 22:05:05.776000 audit[1396]: USER_END pid=1396 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:05:05.776000 audit[1396]: CRED_DISP pid=1396 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:05:05.779087 systemd[1]: sshd@11-10.244.26.146:22-139.178.89.65:54128.service: Deactivated successfully. Mar 17 22:05:05.778000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.244.26.146:22-139.178.89.65:54128 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:05:05.780206 systemd[1]: session-9.scope: Deactivated successfully. Mar 17 22:05:05.780447 systemd[1]: session-9.scope: Consumed 7.062s CPU time. Mar 17 22:05:05.781254 systemd-logind[1193]: Session 9 logged out. Waiting for processes to exit. Mar 17 22:05:05.785442 systemd-logind[1193]: Removed session 9. Mar 17 22:05:05.847000 audit[2283]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2283 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 22:05:05.847000 audit[2283]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffdefa93a80 a2=0 a3=7ffdefa93a6c items=0 ppid=2206 pid=2283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:05.847000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Mar 17 22:05:05.853000 audit[2285]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2285 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 22:05:05.853000 audit[2285]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffc763e6a50 a2=0 a3=7ffc763e6a3c items=0 ppid=2206 pid=2285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:05.853000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Mar 17 22:05:05.860000 audit[2288]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2288 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 22:05:05.860000 audit[2288]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7fff2d3ac220 a2=0 a3=7fff2d3ac20c items=0 ppid=2206 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:05.860000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Mar 17 22:05:05.862000 audit[2289]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2289 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 22:05:05.862000 audit[2289]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc43347390 a2=0 a3=7ffc4334737c items=0 ppid=2206 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:05.862000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Mar 17 22:05:05.866000 audit[2291]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2291 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 22:05:05.866000 audit[2291]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff05d5e890 a2=0 a3=7fff05d5e87c items=0 ppid=2206 pid=2291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:05.866000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Mar 17 22:05:05.868000 audit[2292]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2292 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 22:05:05.868000 audit[2292]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc26c24990 a2=0 a3=7ffc26c2497c items=0 ppid=2206 pid=2292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:05.868000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Mar 17 22:05:05.873000 audit[2294]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2294 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 22:05:05.873000 audit[2294]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffcc1ddee80 a2=0 a3=7ffcc1ddee6c items=0 ppid=2206 pid=2294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:05.873000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Mar 17 22:05:05.882000 audit[2297]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2297 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 22:05:05.882000 audit[2297]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffec5ba42a0 a2=0 a3=7ffec5ba428c items=0 ppid=2206 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:05.882000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Mar 17 22:05:05.884000 audit[2298]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2298 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 22:05:05.884000 audit[2298]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe980819c0 a2=0 a3=7ffe980819ac items=0 ppid=2206 pid=2298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:05.884000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Mar 17 22:05:05.888000 audit[2300]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2300 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 22:05:05.888000 audit[2300]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff093ce3f0 a2=0 a3=7fff093ce3dc items=0 ppid=2206 pid=2300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:05.888000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Mar 17 22:05:05.890000 audit[2301]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2301 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 22:05:05.890000 audit[2301]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffed2dd9fa0 a2=0 a3=7ffed2dd9f8c items=0 ppid=2206 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:05.890000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Mar 17 22:05:05.895000 audit[2303]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2303 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 22:05:05.895000 audit[2303]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdc0a2d0d0 a2=0 a3=7ffdc0a2d0bc items=0 ppid=2206 pid=2303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:05.895000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Mar 17 22:05:05.904000 audit[2306]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2306 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 22:05:05.904000 audit[2306]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffeff0e5130 a2=0 a3=7ffeff0e511c items=0 ppid=2206 pid=2306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:05.904000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Mar 17 22:05:05.910000 audit[2309]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2309 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 22:05:05.910000 audit[2309]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffecfe5dbe0 a2=0 a3=7ffecfe5dbcc items=0 ppid=2206 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:05.910000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Mar 17 22:05:05.912000 audit[2310]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2310 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 22:05:05.912000 audit[2310]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffe5ea3bec0 a2=0 a3=7ffe5ea3beac items=0 ppid=2206 pid=2310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:05.912000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Mar 17 22:05:05.917000 audit[2312]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2312 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 22:05:05.917000 audit[2312]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffe6b559000 a2=0 a3=7ffe6b558fec items=0 ppid=2206 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:05.917000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Mar 17 22:05:05.923000 audit[2315]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2315 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 22:05:05.923000 audit[2315]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffdc01e4d00 a2=0 a3=7ffdc01e4cec items=0 ppid=2206 pid=2315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:05.923000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Mar 17 22:05:05.925000 audit[2316]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2316 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 22:05:05.925000 audit[2316]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffee4e15420 a2=0 a3=7ffee4e1540c items=0 ppid=2206 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:05.925000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Mar 17 22:05:05.929000 audit[2318]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2318 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 22:05:05.929000 audit[2318]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffe14c7a810 a2=0 a3=7ffe14c7a7fc items=0 ppid=2206 pid=2318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:05.929000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Mar 17 22:05:05.972000 audit[2324]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2324 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 22:05:05.972000 audit[2324]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffc1bb2e470 a2=0 a3=7ffc1bb2e45c items=0 ppid=2206 pid=2324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:05.972000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 22:05:05.987000 audit[2324]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2324 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 22:05:05.987000 audit[2324]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7ffc1bb2e470 a2=0 a3=7ffc1bb2e45c items=0 ppid=2206 pid=2324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:05.987000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 22:05:05.990000 audit[2329]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2329 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 22:05:05.990000 audit[2329]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffecc404370 a2=0 a3=7ffecc40435c items=0 ppid=2206 pid=2329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:05.990000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Mar 17 22:05:05.995000 audit[2331]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2331 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 22:05:05.995000 audit[2331]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fffebab36d0 a2=0 a3=7fffebab36bc items=0 ppid=2206 pid=2331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:05.995000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Mar 17 22:05:06.006000 audit[2334]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2334 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 22:05:06.006000 audit[2334]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fff01aef5f0 a2=0 a3=7fff01aef5dc items=0 ppid=2206 pid=2334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:06.006000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Mar 17 22:05:06.014000 audit[2335]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2335 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 22:05:06.014000 audit[2335]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff7ed76be0 a2=0 a3=7fff7ed76bcc items=0 ppid=2206 pid=2335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:06.014000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Mar 17 22:05:06.020000 audit[2337]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2337 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 22:05:06.020000 audit[2337]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd560a46b0 a2=0 a3=7ffd560a469c items=0 ppid=2206 pid=2337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:06.020000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Mar 17 22:05:06.022000 audit[2338]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2338 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 22:05:06.022000 audit[2338]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd175b7190 a2=0 a3=7ffd175b717c items=0 ppid=2206 pid=2338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:06.022000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Mar 17 22:05:06.026000 audit[2340]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2340 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 22:05:06.026000 audit[2340]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffeb4a38e60 a2=0 a3=7ffeb4a38e4c items=0 ppid=2206 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:06.026000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Mar 17 22:05:06.030000 audit[2343]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2343 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 22:05:06.030000 audit[2343]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffde6628ae0 a2=0 a3=7ffde6628acc items=0 ppid=2206 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:06.030000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Mar 17 22:05:06.034000 audit[2344]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2344 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 22:05:06.034000 audit[2344]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd5bd75b30 a2=0 a3=7ffd5bd75b1c items=0 ppid=2206 pid=2344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:06.034000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Mar 17 22:05:06.041000 audit[2346]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2346 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 22:05:06.041000 audit[2346]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff6d9c0d10 a2=0 a3=7fff6d9c0cfc items=0 ppid=2206 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:06.041000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Mar 17 22:05:06.045000 audit[2347]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2347 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 22:05:06.045000 audit[2347]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc4bd91fe0 a2=0 a3=7ffc4bd91fcc items=0 ppid=2206 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:06.045000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Mar 17 22:05:06.050000 audit[2349]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2349 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 22:05:06.050000 audit[2349]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffcfe2a36a0 a2=0 a3=7ffcfe2a368c items=0 ppid=2206 pid=2349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:06.050000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Mar 17 22:05:06.058000 audit[2352]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2352 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 22:05:06.058000 audit[2352]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe377bad20 a2=0 a3=7ffe377bad0c items=0 ppid=2206 pid=2352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:06.058000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Mar 17 22:05:06.066000 audit[2355]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2355 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 22:05:06.066000 audit[2355]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd6272e6f0 a2=0 a3=7ffd6272e6dc items=0 ppid=2206 pid=2355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:06.066000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Mar 17 22:05:06.069000 audit[2356]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2356 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 22:05:06.069000 audit[2356]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffe479279e0 a2=0 a3=7ffe479279cc items=0 ppid=2206 pid=2356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:06.069000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Mar 17 22:05:06.075000 audit[2358]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2358 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 22:05:06.075000 audit[2358]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffef7ff5ed0 a2=0 a3=7ffef7ff5ebc items=0 ppid=2206 pid=2358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:06.075000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Mar 17 22:05:06.081000 audit[2361]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2361 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 22:05:06.081000 audit[2361]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7fff1566df70 a2=0 a3=7fff1566df5c items=0 ppid=2206 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:06.081000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Mar 17 22:05:06.084000 audit[2362]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2362 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 22:05:06.084000 audit[2362]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffb8e4b720 a2=0 a3=7fffb8e4b70c items=0 ppid=2206 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:06.084000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Mar 17 22:05:06.088000 audit[2364]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2364 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 22:05:06.088000 audit[2364]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7fffd773d710 a2=0 a3=7fffd773d6fc items=0 ppid=2206 pid=2364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:06.088000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Mar 17 22:05:06.090000 audit[2365]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2365 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 22:05:06.090000 audit[2365]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe4e83df00 a2=0 a3=7ffe4e83deec items=0 ppid=2206 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:06.090000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Mar 17 22:05:06.094000 audit[2367]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2367 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 22:05:06.094000 audit[2367]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fffec940ac0 a2=0 a3=7fffec940aac items=0 ppid=2206 pid=2367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:06.094000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Mar 17 22:05:06.101000 audit[2370]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2370 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 22:05:06.101000 audit[2370]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff9a949da0 a2=0 a3=7fff9a949d8c items=0 ppid=2206 pid=2370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:06.101000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Mar 17 22:05:06.106000 audit[2372]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2372 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Mar 17 22:05:06.106000 audit[2372]: SYSCALL arch=c000003e syscall=46 success=yes exit=2088 a0=3 a1=7fffeede8f10 a2=0 a3=7fffeede8efc items=0 ppid=2206 pid=2372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:06.106000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 22:05:06.107000 audit[2372]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2372 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Mar 17 22:05:06.107000 audit[2372]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7fffeede8f10 a2=0 a3=7fffeede8efc items=0 ppid=2206 pid=2372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:06.107000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 22:05:06.182947 kubelet[2045]: I0317 22:05:06.182711 2045 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-sm7kp" podStartSLOduration=2.18268695 podStartE2EDuration="2.18268695s" podCreationTimestamp="2025-03-17 22:05:04 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-03-17 22:05:05.670113011 +0000 UTC m=+5.346487540" watchObservedRunningTime="2025-03-17 22:05:06.18268695 +0000 UTC m=+5.859061464" Mar 17 22:05:08.232925 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2780638165.mount: Deactivated successfully. Mar 17 22:05:09.733849 env[1205]: time="2025-03-17T22:05:09.732420690Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.36.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 22:05:09.742420 env[1205]: time="2025-03-17T22:05:09.739372756Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3045aa4a360d468ed15090f280e94c54bf4678269a6e863a9ebcf5b31534a346,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 22:05:09.743624 env[1205]: time="2025-03-17T22:05:09.743383167Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.36.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 22:05:09.761318 env[1205]: time="2025-03-17T22:05:09.756983027Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:fc9ea45f2475fd99db1b36d2ff180a50017b1a5ea0e82a171c6b439b3a620764,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 22:05:09.761318 env[1205]: time="2025-03-17T22:05:09.758349157Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.2\" returns image reference \"sha256:3045aa4a360d468ed15090f280e94c54bf4678269a6e863a9ebcf5b31534a346\"" Mar 17 22:05:09.766353 env[1205]: time="2025-03-17T22:05:09.766273262Z" level=info msg="CreateContainer within sandbox \"01d0dbc14caade4380bfd9c5c3c85073e5c08a037c5ce05db9008d343dea53d7\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Mar 17 22:05:09.792567 env[1205]: time="2025-03-17T22:05:09.792458583Z" level=info msg="CreateContainer within sandbox \"01d0dbc14caade4380bfd9c5c3c85073e5c08a037c5ce05db9008d343dea53d7\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"bfea45301aa989fd3ee83c7708f5b03348f2828c60c3839cef5ad34a4498e372\"" Mar 17 22:05:09.795326 env[1205]: time="2025-03-17T22:05:09.793700062Z" level=info msg="StartContainer for \"bfea45301aa989fd3ee83c7708f5b03348f2828c60c3839cef5ad34a4498e372\"" Mar 17 22:05:09.834200 systemd[1]: run-containerd-runc-k8s.io-bfea45301aa989fd3ee83c7708f5b03348f2828c60c3839cef5ad34a4498e372-runc.Nd5ZHs.mount: Deactivated successfully. Mar 17 22:05:09.840813 systemd[1]: Started cri-containerd-bfea45301aa989fd3ee83c7708f5b03348f2828c60c3839cef5ad34a4498e372.scope. Mar 17 22:05:09.869682 kernel: kauditd_printk_skb: 306 callbacks suppressed Mar 17 22:05:09.870092 kernel: audit: type=1400 audit(1742249109.863:940): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:09.863000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:09.863000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:09.881649 kernel: audit: type=1400 audit(1742249109.863:941): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:09.863000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:09.863000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:09.895481 kernel: audit: type=1400 audit(1742249109.863:942): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:09.895686 kernel: audit: type=1400 audit(1742249109.863:943): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:09.895754 kernel: audit: type=1400 audit(1742249109.863:944): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:09.863000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:09.863000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:09.913424 kernel: audit: type=1400 audit(1742249109.863:945): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:09.913652 kernel: audit: type=1400 audit(1742249109.863:946): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:09.913714 kernel: audit: type=1400 audit(1742249109.863:947): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:09.863000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:09.863000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:09.925106 kernel: audit: type=1400 audit(1742249109.863:948): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:09.863000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:09.874000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:09.931640 kernel: audit: type=1400 audit(1742249109.874:949): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:09.874000 audit: BPF prog-id=114 op=LOAD Mar 17 22:05:09.880000 audit[2381]: AVC avc: denied { bpf } for pid=2381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:09.880000 audit[2381]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2154 pid=2381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:09.880000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266656134353330316161393839666433656538336337373038663562 Mar 17 22:05:09.880000 audit[2381]: AVC avc: denied { perfmon } for pid=2381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:09.880000 audit[2381]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2154 pid=2381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:09.880000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266656134353330316161393839666433656538336337373038663562 Mar 17 22:05:09.880000 audit[2381]: AVC avc: denied { bpf } for pid=2381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:09.880000 audit[2381]: AVC avc: denied { bpf } for pid=2381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:09.880000 audit[2381]: AVC avc: denied { bpf } for pid=2381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:09.880000 audit[2381]: AVC avc: denied { perfmon } for pid=2381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:09.880000 audit[2381]: AVC avc: denied { perfmon } for pid=2381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:09.880000 audit[2381]: AVC avc: denied { perfmon } for pid=2381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:09.880000 audit[2381]: AVC avc: denied { perfmon } for pid=2381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:09.880000 audit[2381]: AVC avc: denied { perfmon } for pid=2381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:09.880000 audit[2381]: AVC avc: denied { bpf } for pid=2381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:09.880000 audit[2381]: AVC avc: denied { bpf } for pid=2381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:09.880000 audit: BPF prog-id=115 op=LOAD Mar 17 22:05:09.880000 audit[2381]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0003963e0 items=0 ppid=2154 pid=2381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:09.880000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266656134353330316161393839666433656538336337373038663562 Mar 17 22:05:09.881000 audit[2381]: AVC avc: denied { bpf } for pid=2381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:09.881000 audit[2381]: AVC avc: denied { bpf } for pid=2381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:09.881000 audit[2381]: AVC avc: denied { perfmon } for pid=2381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:09.881000 audit[2381]: AVC avc: denied { perfmon } for pid=2381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:09.881000 audit[2381]: AVC avc: denied { perfmon } for pid=2381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:09.881000 audit[2381]: AVC avc: denied { perfmon } for pid=2381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:09.881000 audit[2381]: AVC avc: denied { perfmon } for pid=2381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:09.881000 audit[2381]: AVC avc: denied { bpf } for pid=2381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:09.881000 audit[2381]: AVC avc: denied { bpf } for pid=2381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:09.881000 audit: BPF prog-id=116 op=LOAD Mar 17 22:05:09.881000 audit[2381]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000396428 items=0 ppid=2154 pid=2381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:09.881000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266656134353330316161393839666433656538336337373038663562 Mar 17 22:05:09.881000 audit: BPF prog-id=116 op=UNLOAD Mar 17 22:05:09.881000 audit: BPF prog-id=115 op=UNLOAD Mar 17 22:05:09.881000 audit[2381]: AVC avc: denied { bpf } for pid=2381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:09.881000 audit[2381]: AVC avc: denied { bpf } for pid=2381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:09.881000 audit[2381]: AVC avc: denied { bpf } for pid=2381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:09.881000 audit[2381]: AVC avc: denied { perfmon } for pid=2381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:09.881000 audit[2381]: AVC avc: denied { perfmon } for pid=2381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:09.881000 audit[2381]: AVC avc: denied { perfmon } for pid=2381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:09.881000 audit[2381]: AVC avc: denied { perfmon } for pid=2381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:09.881000 audit[2381]: AVC avc: denied { perfmon } for pid=2381 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:09.881000 audit[2381]: AVC avc: denied { bpf } for pid=2381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:09.881000 audit[2381]: AVC avc: denied { bpf } for pid=2381 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:09.881000 audit: BPF prog-id=117 op=LOAD Mar 17 22:05:09.881000 audit[2381]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000396838 items=0 ppid=2154 pid=2381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:09.881000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266656134353330316161393839666433656538336337373038663562 Mar 17 22:05:09.963139 env[1205]: time="2025-03-17T22:05:09.962977978Z" level=info msg="StartContainer for \"bfea45301aa989fd3ee83c7708f5b03348f2828c60c3839cef5ad34a4498e372\" returns successfully" Mar 17 22:05:12.596935 systemd[1]: Started sshd@18-10.244.26.146:22-143.110.184.217:54532.service. Mar 17 22:05:12.596000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.244.26.146:22-143.110.184.217:54532 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:05:13.292000 audit[2417]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=2417 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 22:05:13.292000 audit[2417]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffdbd17ba90 a2=0 a3=7ffdbd17ba7c items=0 ppid=2206 pid=2417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:13.292000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 22:05:13.298000 audit[2417]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2417 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 22:05:13.298000 audit[2417]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffdbd17ba90 a2=0 a3=0 items=0 ppid=2206 pid=2417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:13.298000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 22:05:13.315000 audit[2419]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=2419 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 22:05:13.315000 audit[2419]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffdd143e330 a2=0 a3=7ffdd143e31c items=0 ppid=2206 pid=2419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:13.315000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 22:05:13.337000 audit[2419]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2419 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 22:05:13.337000 audit[2419]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffdd143e330 a2=0 a3=0 items=0 ppid=2206 pid=2419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:13.337000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 22:05:13.379243 sshd[2413]: Invalid user es from 143.110.184.217 port 54532 Mar 17 22:05:13.522386 kubelet[2045]: I0317 22:05:13.522261 2045 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="tigera-operator/tigera-operator-7d68577dc5-n9sd4" podStartSLOduration=4.720498183 podStartE2EDuration="9.522224867s" podCreationTimestamp="2025-03-17 22:05:04 +0000 UTC" firstStartedPulling="2025-03-17 22:05:04.960784984 +0000 UTC m=+4.637159485" lastFinishedPulling="2025-03-17 22:05:09.762511658 +0000 UTC m=+9.438886169" observedRunningTime="2025-03-17 22:05:10.712147338 +0000 UTC m=+10.388521885" watchObservedRunningTime="2025-03-17 22:05:13.522224867 +0000 UTC m=+13.198599374" Mar 17 22:05:13.532169 systemd[1]: Created slice kubepods-besteffort-pod50484d0b_39bd_462d_98e3_eb79fe0d8834.slice. Mar 17 22:05:13.548471 kubelet[2045]: I0317 22:05:13.548298 2045 status_manager.go:890] "Failed to get status for pod" podUID="50484d0b-39bd-462d-98e3-eb79fe0d8834" pod="calico-system/calico-typha-764dc47956-2xc9t" err="pods \"calico-typha-764dc47956-2xc9t\" is forbidden: User \"system:node:srv-zbif7.gb1.brightbox.com\" cannot get resource \"pods\" in API group \"\" in the namespace \"calico-system\": no relationship found between node 'srv-zbif7.gb1.brightbox.com' and this object" Mar 17 22:05:13.551485 kubelet[2045]: W0317 22:05:13.551408 2045 reflector.go:569] object-"calico-system"/"tigera-ca-bundle": failed to list *v1.ConfigMap: configmaps "tigera-ca-bundle" is forbidden: User "system:node:srv-zbif7.gb1.brightbox.com" cannot list resource "configmaps" in API group "" in the namespace "calico-system": no relationship found between node 'srv-zbif7.gb1.brightbox.com' and this object Mar 17 22:05:13.551662 kubelet[2045]: E0317 22:05:13.551514 2045 reflector.go:166] "Unhandled Error" err="object-\"calico-system\"/\"tigera-ca-bundle\": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps \"tigera-ca-bundle\" is forbidden: User \"system:node:srv-zbif7.gb1.brightbox.com\" cannot list resource \"configmaps\" in API group \"\" in the namespace \"calico-system\": no relationship found between node 'srv-zbif7.gb1.brightbox.com' and this object" logger="UnhandledError" Mar 17 22:05:13.551745 kubelet[2045]: W0317 22:05:13.551680 2045 reflector.go:569] object-"calico-system"/"typha-certs": failed to list *v1.Secret: secrets "typha-certs" is forbidden: User "system:node:srv-zbif7.gb1.brightbox.com" cannot list resource "secrets" in API group "" in the namespace "calico-system": no relationship found between node 'srv-zbif7.gb1.brightbox.com' and this object Mar 17 22:05:13.551745 kubelet[2045]: E0317 22:05:13.551708 2045 reflector.go:166] "Unhandled Error" err="object-\"calico-system\"/\"typha-certs\": Failed to watch *v1.Secret: failed to list *v1.Secret: secrets \"typha-certs\" is forbidden: User \"system:node:srv-zbif7.gb1.brightbox.com\" cannot list resource \"secrets\" in API group \"\" in the namespace \"calico-system\": no relationship found between node 'srv-zbif7.gb1.brightbox.com' and this object" logger="UnhandledError" Mar 17 22:05:13.551881 kubelet[2045]: W0317 22:05:13.551744 2045 reflector.go:569] object-"calico-system"/"kube-root-ca.crt": failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:srv-zbif7.gb1.brightbox.com" cannot list resource "configmaps" in API group "" in the namespace "calico-system": no relationship found between node 'srv-zbif7.gb1.brightbox.com' and this object Mar 17 22:05:13.551881 kubelet[2045]: E0317 22:05:13.551768 2045 reflector.go:166] "Unhandled Error" err="object-\"calico-system\"/\"kube-root-ca.crt\": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps \"kube-root-ca.crt\" is forbidden: User \"system:node:srv-zbif7.gb1.brightbox.com\" cannot list resource \"configmaps\" in API group \"\" in the namespace \"calico-system\": no relationship found between node 'srv-zbif7.gb1.brightbox.com' and this object" logger="UnhandledError" Mar 17 22:05:13.552146 sshd[2413]: pam_faillock(sshd:auth): User unknown Mar 17 22:05:13.553602 sshd[2413]: pam_unix(sshd:auth): check pass; user unknown Mar 17 22:05:13.553811 sshd[2413]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.110.184.217 Mar 17 22:05:13.554830 sshd[2413]: pam_faillock(sshd:auth): User unknown Mar 17 22:05:13.554000 audit[2413]: USER_AUTH pid=2413 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="es" exe="/usr/sbin/sshd" hostname=143.110.184.217 addr=143.110.184.217 terminal=ssh res=failed' Mar 17 22:05:13.647022 kubelet[2045]: I0317 22:05:13.646968 2045 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/50484d0b-39bd-462d-98e3-eb79fe0d8834-tigera-ca-bundle\") pod \"calico-typha-764dc47956-2xc9t\" (UID: \"50484d0b-39bd-462d-98e3-eb79fe0d8834\") " pod="calico-system/calico-typha-764dc47956-2xc9t" Mar 17 22:05:13.647365 kubelet[2045]: I0317 22:05:13.647333 2045 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-qj2pt\" (UniqueName: \"kubernetes.io/projected/50484d0b-39bd-462d-98e3-eb79fe0d8834-kube-api-access-qj2pt\") pod \"calico-typha-764dc47956-2xc9t\" (UID: \"50484d0b-39bd-462d-98e3-eb79fe0d8834\") " pod="calico-system/calico-typha-764dc47956-2xc9t" Mar 17 22:05:13.648008 kubelet[2045]: I0317 22:05:13.647976 2045 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/50484d0b-39bd-462d-98e3-eb79fe0d8834-typha-certs\") pod \"calico-typha-764dc47956-2xc9t\" (UID: \"50484d0b-39bd-462d-98e3-eb79fe0d8834\") " pod="calico-system/calico-typha-764dc47956-2xc9t" Mar 17 22:05:13.759557 systemd[1]: Created slice kubepods-besteffort-pod1d16d892_069a_48a5_b68f_eb22b6af1e49.slice. Mar 17 22:05:13.849556 kubelet[2045]: I0317 22:05:13.849359 2045 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/1d16d892-069a-48a5-b68f-eb22b6af1e49-var-lib-calico\") pod \"calico-node-cw6hs\" (UID: \"1d16d892-069a-48a5-b68f-eb22b6af1e49\") " pod="calico-system/calico-node-cw6hs" Mar 17 22:05:13.849556 kubelet[2045]: I0317 22:05:13.849459 2045 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/1d16d892-069a-48a5-b68f-eb22b6af1e49-cni-log-dir\") pod \"calico-node-cw6hs\" (UID: \"1d16d892-069a-48a5-b68f-eb22b6af1e49\") " pod="calico-system/calico-node-cw6hs" Mar 17 22:05:13.849556 kubelet[2045]: I0317 22:05:13.849521 2045 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/1d16d892-069a-48a5-b68f-eb22b6af1e49-xtables-lock\") pod \"calico-node-cw6hs\" (UID: \"1d16d892-069a-48a5-b68f-eb22b6af1e49\") " pod="calico-system/calico-node-cw6hs" Mar 17 22:05:13.849907 kubelet[2045]: I0317 22:05:13.849584 2045 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/1d16d892-069a-48a5-b68f-eb22b6af1e49-flexvol-driver-host\") pod \"calico-node-cw6hs\" (UID: \"1d16d892-069a-48a5-b68f-eb22b6af1e49\") " pod="calico-system/calico-node-cw6hs" Mar 17 22:05:13.849907 kubelet[2045]: I0317 22:05:13.849708 2045 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/1d16d892-069a-48a5-b68f-eb22b6af1e49-tigera-ca-bundle\") pod \"calico-node-cw6hs\" (UID: \"1d16d892-069a-48a5-b68f-eb22b6af1e49\") " pod="calico-system/calico-node-cw6hs" Mar 17 22:05:13.849907 kubelet[2045]: I0317 22:05:13.849744 2045 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/1d16d892-069a-48a5-b68f-eb22b6af1e49-node-certs\") pod \"calico-node-cw6hs\" (UID: \"1d16d892-069a-48a5-b68f-eb22b6af1e49\") " pod="calico-system/calico-node-cw6hs" Mar 17 22:05:13.849907 kubelet[2045]: I0317 22:05:13.849802 2045 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/1d16d892-069a-48a5-b68f-eb22b6af1e49-cni-net-dir\") pod \"calico-node-cw6hs\" (UID: \"1d16d892-069a-48a5-b68f-eb22b6af1e49\") " pod="calico-system/calico-node-cw6hs" Mar 17 22:05:13.849907 kubelet[2045]: I0317 22:05:13.849837 2045 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/1d16d892-069a-48a5-b68f-eb22b6af1e49-policysync\") pod \"calico-node-cw6hs\" (UID: \"1d16d892-069a-48a5-b68f-eb22b6af1e49\") " pod="calico-system/calico-node-cw6hs" Mar 17 22:05:13.850244 kubelet[2045]: I0317 22:05:13.849875 2045 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/1d16d892-069a-48a5-b68f-eb22b6af1e49-var-run-calico\") pod \"calico-node-cw6hs\" (UID: \"1d16d892-069a-48a5-b68f-eb22b6af1e49\") " pod="calico-system/calico-node-cw6hs" Mar 17 22:05:13.850244 kubelet[2045]: I0317 22:05:13.849906 2045 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/1d16d892-069a-48a5-b68f-eb22b6af1e49-lib-modules\") pod \"calico-node-cw6hs\" (UID: \"1d16d892-069a-48a5-b68f-eb22b6af1e49\") " pod="calico-system/calico-node-cw6hs" Mar 17 22:05:13.850244 kubelet[2045]: I0317 22:05:13.849969 2045 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/1d16d892-069a-48a5-b68f-eb22b6af1e49-cni-bin-dir\") pod \"calico-node-cw6hs\" (UID: \"1d16d892-069a-48a5-b68f-eb22b6af1e49\") " pod="calico-system/calico-node-cw6hs" Mar 17 22:05:13.850244 kubelet[2045]: I0317 22:05:13.850016 2045 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-bcmb7\" (UniqueName: \"kubernetes.io/projected/1d16d892-069a-48a5-b68f-eb22b6af1e49-kube-api-access-bcmb7\") pod \"calico-node-cw6hs\" (UID: \"1d16d892-069a-48a5-b68f-eb22b6af1e49\") " pod="calico-system/calico-node-cw6hs" Mar 17 22:05:13.929336 kubelet[2045]: E0317 22:05:13.929214 2045 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-8qsmb" podUID="72a58b73-e5b8-4cf5-bcd4-e7ba6f464863" Mar 17 22:05:13.971776 kubelet[2045]: E0317 22:05:13.971720 2045 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 22:05:13.971776 kubelet[2045]: W0317 22:05:13.971763 2045 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 22:05:13.972084 kubelet[2045]: E0317 22:05:13.971826 2045 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 22:05:14.053947 kubelet[2045]: E0317 22:05:14.048929 2045 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 22:05:14.053947 kubelet[2045]: W0317 22:05:14.048962 2045 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 22:05:14.053947 kubelet[2045]: E0317 22:05:14.048991 2045 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 22:05:14.053947 kubelet[2045]: E0317 22:05:14.050831 2045 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 22:05:14.053947 kubelet[2045]: W0317 22:05:14.050854 2045 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 22:05:14.053947 kubelet[2045]: E0317 22:05:14.050877 2045 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 22:05:14.053947 kubelet[2045]: E0317 22:05:14.051176 2045 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 22:05:14.053947 kubelet[2045]: W0317 22:05:14.051191 2045 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 22:05:14.053947 kubelet[2045]: E0317 22:05:14.051207 2045 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 22:05:14.053947 kubelet[2045]: E0317 22:05:14.051602 2045 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 22:05:14.054712 kubelet[2045]: W0317 22:05:14.051619 2045 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 22:05:14.054712 kubelet[2045]: E0317 22:05:14.051634 2045 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 22:05:14.054712 kubelet[2045]: E0317 22:05:14.051925 2045 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 22:05:14.054712 kubelet[2045]: W0317 22:05:14.051950 2045 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 22:05:14.054712 kubelet[2045]: E0317 22:05:14.051967 2045 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 22:05:14.054712 kubelet[2045]: E0317 22:05:14.052240 2045 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 22:05:14.054712 kubelet[2045]: W0317 22:05:14.052256 2045 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 22:05:14.054712 kubelet[2045]: E0317 22:05:14.052272 2045 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 22:05:14.054712 kubelet[2045]: E0317 22:05:14.052514 2045 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 22:05:14.054712 kubelet[2045]: W0317 22:05:14.052528 2045 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 22:05:14.055293 kubelet[2045]: E0317 22:05:14.052573 2045 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 22:05:14.055293 kubelet[2045]: E0317 22:05:14.052841 2045 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 22:05:14.055293 kubelet[2045]: W0317 22:05:14.052855 2045 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 22:05:14.055293 kubelet[2045]: E0317 22:05:14.052871 2045 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 22:05:14.055293 kubelet[2045]: E0317 22:05:14.053182 2045 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 22:05:14.055293 kubelet[2045]: W0317 22:05:14.053196 2045 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 22:05:14.055293 kubelet[2045]: E0317 22:05:14.053211 2045 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 22:05:14.065997 kubelet[2045]: E0317 22:05:14.062726 2045 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 22:05:14.065997 kubelet[2045]: W0317 22:05:14.062752 2045 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 22:05:14.065997 kubelet[2045]: E0317 22:05:14.062784 2045 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 22:05:14.067871 kubelet[2045]: E0317 22:05:14.067632 2045 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 22:05:14.067871 kubelet[2045]: W0317 22:05:14.067697 2045 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 22:05:14.067871 kubelet[2045]: E0317 22:05:14.067740 2045 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 22:05:14.068423 kubelet[2045]: E0317 22:05:14.068396 2045 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 22:05:14.068423 kubelet[2045]: W0317 22:05:14.068419 2045 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 22:05:14.068729 kubelet[2045]: E0317 22:05:14.068437 2045 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 22:05:14.069017 kubelet[2045]: E0317 22:05:14.068988 2045 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 22:05:14.069017 kubelet[2045]: W0317 22:05:14.069011 2045 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 22:05:14.069161 kubelet[2045]: E0317 22:05:14.069029 2045 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 22:05:14.069358 kubelet[2045]: E0317 22:05:14.069332 2045 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 22:05:14.069358 kubelet[2045]: W0317 22:05:14.069354 2045 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 22:05:14.069516 kubelet[2045]: E0317 22:05:14.069372 2045 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 22:05:14.069732 kubelet[2045]: E0317 22:05:14.069705 2045 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 22:05:14.069732 kubelet[2045]: W0317 22:05:14.069726 2045 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 22:05:14.069877 kubelet[2045]: E0317 22:05:14.069743 2045 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 22:05:14.070141 kubelet[2045]: E0317 22:05:14.069985 2045 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 22:05:14.070221 kubelet[2045]: W0317 22:05:14.070142 2045 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 22:05:14.070221 kubelet[2045]: E0317 22:05:14.070163 2045 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 22:05:14.070485 kubelet[2045]: E0317 22:05:14.070460 2045 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 22:05:14.070605 kubelet[2045]: W0317 22:05:14.070482 2045 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 22:05:14.070605 kubelet[2045]: E0317 22:05:14.070515 2045 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 22:05:14.070841 kubelet[2045]: E0317 22:05:14.070809 2045 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 22:05:14.070841 kubelet[2045]: W0317 22:05:14.070833 2045 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 22:05:14.070983 kubelet[2045]: E0317 22:05:14.070849 2045 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 22:05:14.080525 kubelet[2045]: E0317 22:05:14.073960 2045 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 22:05:14.080525 kubelet[2045]: W0317 22:05:14.073986 2045 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 22:05:14.080525 kubelet[2045]: E0317 22:05:14.074009 2045 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 22:05:14.080525 kubelet[2045]: E0317 22:05:14.074360 2045 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 22:05:14.080525 kubelet[2045]: W0317 22:05:14.074376 2045 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 22:05:14.080525 kubelet[2045]: E0317 22:05:14.074392 2045 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 22:05:14.080525 kubelet[2045]: E0317 22:05:14.074871 2045 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 22:05:14.080525 kubelet[2045]: W0317 22:05:14.074896 2045 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 22:05:14.080525 kubelet[2045]: E0317 22:05:14.074914 2045 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 22:05:14.081224 kubelet[2045]: I0317 22:05:14.074950 2045 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/72a58b73-e5b8-4cf5-bcd4-e7ba6f464863-kubelet-dir\") pod \"csi-node-driver-8qsmb\" (UID: \"72a58b73-e5b8-4cf5-bcd4-e7ba6f464863\") " pod="calico-system/csi-node-driver-8qsmb" Mar 17 22:05:14.081224 kubelet[2045]: E0317 22:05:14.075479 2045 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 22:05:14.081224 kubelet[2045]: W0317 22:05:14.075497 2045 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 22:05:14.081224 kubelet[2045]: E0317 22:05:14.075520 2045 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 22:05:14.081224 kubelet[2045]: I0317 22:05:14.075558 2045 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/72a58b73-e5b8-4cf5-bcd4-e7ba6f464863-varrun\") pod \"csi-node-driver-8qsmb\" (UID: \"72a58b73-e5b8-4cf5-bcd4-e7ba6f464863\") " pod="calico-system/csi-node-driver-8qsmb" Mar 17 22:05:14.081224 kubelet[2045]: E0317 22:05:14.075950 2045 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 22:05:14.081224 kubelet[2045]: W0317 22:05:14.075970 2045 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 22:05:14.081224 kubelet[2045]: E0317 22:05:14.075995 2045 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 22:05:14.081881 kubelet[2045]: I0317 22:05:14.076022 2045 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-rswnp\" (UniqueName: \"kubernetes.io/projected/72a58b73-e5b8-4cf5-bcd4-e7ba6f464863-kube-api-access-rswnp\") pod \"csi-node-driver-8qsmb\" (UID: \"72a58b73-e5b8-4cf5-bcd4-e7ba6f464863\") " pod="calico-system/csi-node-driver-8qsmb" Mar 17 22:05:14.081881 kubelet[2045]: E0317 22:05:14.076400 2045 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 22:05:14.081881 kubelet[2045]: W0317 22:05:14.076420 2045 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 22:05:14.081881 kubelet[2045]: E0317 22:05:14.076488 2045 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 22:05:14.081881 kubelet[2045]: I0317 22:05:14.076516 2045 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/72a58b73-e5b8-4cf5-bcd4-e7ba6f464863-socket-dir\") pod \"csi-node-driver-8qsmb\" (UID: \"72a58b73-e5b8-4cf5-bcd4-e7ba6f464863\") " pod="calico-system/csi-node-driver-8qsmb" Mar 17 22:05:14.082636 kubelet[2045]: E0317 22:05:14.082526 2045 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 22:05:14.082636 kubelet[2045]: W0317 22:05:14.082629 2045 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 22:05:14.082755 kubelet[2045]: E0317 22:05:14.082684 2045 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 22:05:14.082809 kubelet[2045]: I0317 22:05:14.082738 2045 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/72a58b73-e5b8-4cf5-bcd4-e7ba6f464863-registration-dir\") pod \"csi-node-driver-8qsmb\" (UID: \"72a58b73-e5b8-4cf5-bcd4-e7ba6f464863\") " pod="calico-system/csi-node-driver-8qsmb" Mar 17 22:05:14.083332 kubelet[2045]: E0317 22:05:14.083225 2045 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 22:05:14.083332 kubelet[2045]: W0317 22:05:14.083317 2045 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 22:05:14.083471 kubelet[2045]: E0317 22:05:14.083445 2045 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 22:05:14.083720 kubelet[2045]: E0317 22:05:14.083663 2045 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 22:05:14.083815 kubelet[2045]: W0317 22:05:14.083714 2045 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 22:05:14.083893 kubelet[2045]: E0317 22:05:14.083852 2045 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 22:05:14.084124 kubelet[2045]: E0317 22:05:14.084093 2045 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 22:05:14.084124 kubelet[2045]: W0317 22:05:14.084117 2045 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 22:05:14.084333 kubelet[2045]: E0317 22:05:14.084302 2045 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 22:05:14.084509 kubelet[2045]: E0317 22:05:14.084480 2045 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 22:05:14.084509 kubelet[2045]: W0317 22:05:14.084502 2045 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 22:05:14.084787 kubelet[2045]: E0317 22:05:14.084735 2045 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 22:05:14.084997 kubelet[2045]: E0317 22:05:14.084968 2045 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 22:05:14.084997 kubelet[2045]: W0317 22:05:14.084990 2045 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 22:05:14.085175 kubelet[2045]: E0317 22:05:14.085161 2045 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 22:05:14.085380 kubelet[2045]: E0317 22:05:14.085353 2045 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 22:05:14.085380 kubelet[2045]: W0317 22:05:14.085374 2045 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 22:05:14.085502 kubelet[2045]: E0317 22:05:14.085391 2045 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 22:05:14.085871 kubelet[2045]: E0317 22:05:14.085842 2045 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 22:05:14.085871 kubelet[2045]: W0317 22:05:14.085863 2045 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 22:05:14.086038 kubelet[2045]: E0317 22:05:14.085881 2045 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 22:05:14.086219 kubelet[2045]: E0317 22:05:14.086184 2045 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 22:05:14.086219 kubelet[2045]: W0317 22:05:14.086206 2045 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 22:05:14.086377 kubelet[2045]: E0317 22:05:14.086223 2045 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 22:05:14.089596 kubelet[2045]: E0317 22:05:14.089504 2045 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 22:05:14.089596 kubelet[2045]: W0317 22:05:14.089587 2045 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 22:05:14.089861 kubelet[2045]: E0317 22:05:14.089621 2045 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 22:05:14.091170 kubelet[2045]: E0317 22:05:14.091089 2045 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 22:05:14.091391 kubelet[2045]: W0317 22:05:14.091170 2045 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 22:05:14.091391 kubelet[2045]: E0317 22:05:14.091218 2045 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 22:05:14.184156 kubelet[2045]: E0317 22:05:14.184108 2045 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 22:05:14.184156 kubelet[2045]: W0317 22:05:14.184143 2045 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 22:05:14.184453 kubelet[2045]: E0317 22:05:14.184172 2045 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 22:05:14.184615 kubelet[2045]: E0317 22:05:14.184589 2045 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 22:05:14.184615 kubelet[2045]: W0317 22:05:14.184610 2045 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 22:05:14.184765 kubelet[2045]: E0317 22:05:14.184634 2045 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 22:05:14.184966 kubelet[2045]: E0317 22:05:14.184939 2045 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 22:05:14.184966 kubelet[2045]: W0317 22:05:14.184961 2045 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 22:05:14.185081 kubelet[2045]: E0317 22:05:14.184984 2045 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 22:05:14.185387 kubelet[2045]: E0317 22:05:14.185355 2045 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 22:05:14.185387 kubelet[2045]: W0317 22:05:14.185379 2045 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 22:05:14.185504 kubelet[2045]: E0317 22:05:14.185403 2045 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 22:05:14.185741 kubelet[2045]: E0317 22:05:14.185712 2045 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 22:05:14.185741 kubelet[2045]: W0317 22:05:14.185733 2045 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 22:05:14.186050 kubelet[2045]: E0317 22:05:14.185853 2045 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 22:05:14.186050 kubelet[2045]: E0317 22:05:14.185993 2045 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 22:05:14.186050 kubelet[2045]: W0317 22:05:14.186021 2045 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 22:05:14.186339 kubelet[2045]: E0317 22:05:14.186139 2045 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 22:05:14.186339 kubelet[2045]: E0317 22:05:14.186336 2045 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 22:05:14.186451 kubelet[2045]: W0317 22:05:14.186351 2045 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 22:05:14.186524 kubelet[2045]: E0317 22:05:14.186470 2045 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 22:05:14.186677 kubelet[2045]: E0317 22:05:14.186650 2045 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 22:05:14.186677 kubelet[2045]: W0317 22:05:14.186671 2045 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 22:05:14.186806 kubelet[2045]: E0317 22:05:14.186778 2045 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 22:05:14.186981 kubelet[2045]: E0317 22:05:14.186953 2045 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 22:05:14.186981 kubelet[2045]: W0317 22:05:14.186973 2045 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 22:05:14.187141 kubelet[2045]: E0317 22:05:14.187084 2045 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 22:05:14.187367 kubelet[2045]: E0317 22:05:14.187333 2045 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 22:05:14.187367 kubelet[2045]: W0317 22:05:14.187361 2045 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 22:05:14.187517 kubelet[2045]: E0317 22:05:14.187491 2045 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 22:05:14.187733 kubelet[2045]: E0317 22:05:14.187680 2045 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 22:05:14.187733 kubelet[2045]: W0317 22:05:14.187700 2045 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 22:05:14.187846 kubelet[2045]: E0317 22:05:14.187811 2045 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 22:05:14.188014 kubelet[2045]: E0317 22:05:14.187986 2045 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 22:05:14.188014 kubelet[2045]: W0317 22:05:14.188006 2045 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 22:05:14.188679 kubelet[2045]: E0317 22:05:14.188625 2045 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 22:05:14.192989 kubelet[2045]: E0317 22:05:14.192411 2045 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 22:05:14.192989 kubelet[2045]: W0317 22:05:14.192505 2045 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 22:05:14.192989 kubelet[2045]: E0317 22:05:14.192810 2045 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 22:05:14.193636 kubelet[2045]: E0317 22:05:14.193035 2045 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 22:05:14.193636 kubelet[2045]: W0317 22:05:14.193053 2045 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 22:05:14.193636 kubelet[2045]: E0317 22:05:14.193107 2045 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 22:05:14.193636 kubelet[2045]: E0317 22:05:14.193387 2045 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 22:05:14.193636 kubelet[2045]: W0317 22:05:14.193403 2045 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 22:05:14.193636 kubelet[2045]: E0317 22:05:14.193442 2045 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 22:05:14.194299 kubelet[2045]: E0317 22:05:14.193740 2045 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 22:05:14.194299 kubelet[2045]: W0317 22:05:14.193755 2045 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 22:05:14.194299 kubelet[2045]: E0317 22:05:14.193795 2045 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 22:05:14.194299 kubelet[2045]: E0317 22:05:14.194003 2045 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 22:05:14.194299 kubelet[2045]: W0317 22:05:14.194017 2045 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 22:05:14.194299 kubelet[2045]: E0317 22:05:14.194054 2045 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 22:05:14.194299 kubelet[2045]: E0317 22:05:14.194268 2045 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 22:05:14.194299 kubelet[2045]: W0317 22:05:14.194284 2045 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 22:05:14.194299 kubelet[2045]: E0317 22:05:14.194320 2045 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 22:05:14.195520 kubelet[2045]: E0317 22:05:14.194527 2045 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 22:05:14.195520 kubelet[2045]: W0317 22:05:14.194562 2045 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 22:05:14.195520 kubelet[2045]: E0317 22:05:14.194600 2045 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 22:05:14.195520 kubelet[2045]: E0317 22:05:14.194802 2045 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 22:05:14.195520 kubelet[2045]: W0317 22:05:14.194816 2045 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 22:05:14.195520 kubelet[2045]: E0317 22:05:14.194853 2045 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 22:05:14.195520 kubelet[2045]: E0317 22:05:14.195094 2045 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 22:05:14.195520 kubelet[2045]: W0317 22:05:14.195111 2045 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 22:05:14.195520 kubelet[2045]: E0317 22:05:14.195136 2045 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 22:05:14.195520 kubelet[2045]: E0317 22:05:14.195429 2045 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 22:05:14.197008 kubelet[2045]: W0317 22:05:14.195444 2045 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 22:05:14.197008 kubelet[2045]: E0317 22:05:14.195468 2045 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 22:05:14.197008 kubelet[2045]: E0317 22:05:14.195821 2045 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 22:05:14.197008 kubelet[2045]: W0317 22:05:14.195836 2045 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 22:05:14.197008 kubelet[2045]: E0317 22:05:14.195860 2045 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 22:05:14.197008 kubelet[2045]: E0317 22:05:14.196459 2045 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 22:05:14.197008 kubelet[2045]: W0317 22:05:14.196476 2045 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 22:05:14.197008 kubelet[2045]: E0317 22:05:14.196498 2045 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 22:05:14.197008 kubelet[2045]: E0317 22:05:14.196890 2045 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 22:05:14.197008 kubelet[2045]: W0317 22:05:14.196906 2045 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 22:05:14.197683 kubelet[2045]: E0317 22:05:14.196925 2045 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 22:05:14.358000 audit[2483]: NETFILTER_CFG table=filter:93 family=2 entries=17 op=nft_register_rule pid=2483 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 22:05:14.358000 audit[2483]: SYSCALL arch=c000003e syscall=46 success=yes exit=6736 a0=3 a1=7fffec0493f0 a2=0 a3=7fffec0493dc items=0 ppid=2206 pid=2483 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:14.358000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 22:05:14.364000 audit[2483]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2483 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 22:05:14.364000 audit[2483]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fffec0493f0 a2=0 a3=0 items=0 ppid=2206 pid=2483 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:14.364000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 22:05:14.623609 kubelet[2045]: E0317 22:05:14.623371 2045 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 22:05:14.626151 kubelet[2045]: W0317 22:05:14.626110 2045 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 22:05:14.626351 kubelet[2045]: E0317 22:05:14.626321 2045 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 22:05:14.638458 kubelet[2045]: E0317 22:05:14.635627 2045 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 22:05:14.639480 kubelet[2045]: W0317 22:05:14.635663 2045 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 22:05:14.639959 kubelet[2045]: E0317 22:05:14.639506 2045 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 22:05:14.643083 kubelet[2045]: E0317 22:05:14.643037 2045 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 22:05:14.643453 kubelet[2045]: W0317 22:05:14.643392 2045 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 22:05:14.643752 kubelet[2045]: E0317 22:05:14.643707 2045 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 22:05:14.719777 kubelet[2045]: E0317 22:05:14.719738 2045 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 22:05:14.720022 kubelet[2045]: W0317 22:05:14.719991 2045 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 22:05:14.720261 kubelet[2045]: E0317 22:05:14.720215 2045 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 22:05:14.751102 kubelet[2045]: E0317 22:05:14.751008 2045 configmap.go:193] Couldn't get configMap calico-system/tigera-ca-bundle: failed to sync configmap cache: timed out waiting for the condition Mar 17 22:05:14.751462 kubelet[2045]: E0317 22:05:14.751197 2045 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/configmap/50484d0b-39bd-462d-98e3-eb79fe0d8834-tigera-ca-bundle podName:50484d0b-39bd-462d-98e3-eb79fe0d8834 nodeName:}" failed. No retries permitted until 2025-03-17 22:05:15.251135527 +0000 UTC m=+14.927510029 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "tigera-ca-bundle" (UniqueName: "kubernetes.io/configmap/50484d0b-39bd-462d-98e3-eb79fe0d8834-tigera-ca-bundle") pod "calico-typha-764dc47956-2xc9t" (UID: "50484d0b-39bd-462d-98e3-eb79fe0d8834") : failed to sync configmap cache: timed out waiting for the condition Mar 17 22:05:14.790791 kubelet[2045]: E0317 22:05:14.790745 2045 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 22:05:14.791079 kubelet[2045]: W0317 22:05:14.791047 2045 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 22:05:14.791279 kubelet[2045]: E0317 22:05:14.791237 2045 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 22:05:14.895636 kubelet[2045]: E0317 22:05:14.895592 2045 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 22:05:14.895636 kubelet[2045]: W0317 22:05:14.895631 2045 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 22:05:14.895951 kubelet[2045]: E0317 22:05:14.895676 2045 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 22:05:14.896342 kubelet[2045]: E0317 22:05:14.896274 2045 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 22:05:14.896342 kubelet[2045]: W0317 22:05:14.896291 2045 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 22:05:14.896342 kubelet[2045]: E0317 22:05:14.896308 2045 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 22:05:14.973789 env[1205]: time="2025-03-17T22:05:14.972994398Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-cw6hs,Uid:1d16d892-069a-48a5-b68f-eb22b6af1e49,Namespace:calico-system,Attempt:0,}" Mar 17 22:05:14.998595 kubelet[2045]: E0317 22:05:14.996942 2045 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 22:05:14.998595 kubelet[2045]: W0317 22:05:14.996978 2045 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 22:05:14.998595 kubelet[2045]: E0317 22:05:14.997217 2045 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 22:05:15.013491 env[1205]: time="2025-03-17T22:05:15.013083029Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Mar 17 22:05:15.013491 env[1205]: time="2025-03-17T22:05:15.013175377Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Mar 17 22:05:15.013491 env[1205]: time="2025-03-17T22:05:15.013214927Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Mar 17 22:05:15.014076 env[1205]: time="2025-03-17T22:05:15.013973784Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/aac25bb5e96819055c4887fb91cd1be38a154a25dca346a62f486d196cd98763 pid=2505 runtime=io.containerd.runc.v2 Mar 17 22:05:15.055174 systemd[1]: Started cri-containerd-aac25bb5e96819055c4887fb91cd1be38a154a25dca346a62f486d196cd98763.scope. Mar 17 22:05:15.099319 kernel: kauditd_printk_skb: 67 callbacks suppressed Mar 17 22:05:15.099493 kernel: audit: type=1400 audit(1742249115.088:966): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:15.088000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:15.101952 kubelet[2045]: E0317 22:05:15.101533 2045 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 22:05:15.101952 kubelet[2045]: W0317 22:05:15.101704 2045 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 22:05:15.101952 kubelet[2045]: E0317 22:05:15.101809 2045 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 22:05:15.088000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:15.114603 kernel: audit: type=1400 audit(1742249115.088:967): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:15.114730 kernel: audit: type=1400 audit(1742249115.088:968): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:15.088000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:15.088000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:15.088000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:15.125576 kernel: audit: type=1400 audit(1742249115.088:969): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:15.125773 kernel: audit: type=1400 audit(1742249115.088:970): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:15.125834 kernel: audit: type=1400 audit(1742249115.088:971): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:15.088000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:15.088000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:15.138849 kernel: audit: type=1400 audit(1742249115.088:972): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:15.139086 kernel: audit: type=1400 audit(1742249115.088:973): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:15.088000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:15.088000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:15.153710 kernel: audit: type=1400 audit(1742249115.088:974): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:15.088000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:15.088000 audit: BPF prog-id=118 op=LOAD Mar 17 22:05:15.159868 kernel: audit: type=1400 audit(1742249115.088:975): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:15.102000 audit[2517]: AVC avc: denied { bpf } for pid=2517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:15.102000 audit[2517]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2505 pid=2517 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:15.102000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161633235626235653936383139303535633438383766623931636431 Mar 17 22:05:15.102000 audit[2517]: AVC avc: denied { perfmon } for pid=2517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:15.102000 audit[2517]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=2505 pid=2517 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:15.102000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161633235626235653936383139303535633438383766623931636431 Mar 17 22:05:15.102000 audit[2517]: AVC avc: denied { bpf } for pid=2517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:15.102000 audit[2517]: AVC avc: denied { bpf } for pid=2517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:15.102000 audit[2517]: AVC avc: denied { bpf } for pid=2517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:15.102000 audit[2517]: AVC avc: denied { perfmon } for pid=2517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:15.102000 audit[2517]: AVC avc: denied { perfmon } for pid=2517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:15.102000 audit[2517]: AVC avc: denied { perfmon } for pid=2517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:15.102000 audit[2517]: AVC avc: denied { perfmon } for pid=2517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:15.102000 audit[2517]: AVC avc: denied { perfmon } for pid=2517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:15.102000 audit[2517]: AVC avc: denied { bpf } for pid=2517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:15.102000 audit[2517]: AVC avc: denied { bpf } for pid=2517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:15.102000 audit: BPF prog-id=119 op=LOAD Mar 17 22:05:15.102000 audit[2517]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0002abed0 items=0 ppid=2505 pid=2517 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:15.102000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161633235626235653936383139303535633438383766623931636431 Mar 17 22:05:15.102000 audit[2517]: AVC avc: denied { bpf } for pid=2517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:15.102000 audit[2517]: AVC avc: denied { bpf } for pid=2517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:15.102000 audit[2517]: AVC avc: denied { perfmon } for pid=2517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:15.102000 audit[2517]: AVC avc: denied { perfmon } for pid=2517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:15.102000 audit[2517]: AVC avc: denied { perfmon } for pid=2517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:15.102000 audit[2517]: AVC avc: denied { perfmon } for pid=2517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:15.102000 audit[2517]: AVC avc: denied { perfmon } for pid=2517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:15.102000 audit[2517]: AVC avc: denied { bpf } for pid=2517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:15.102000 audit[2517]: AVC avc: denied { bpf } for pid=2517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:15.102000 audit: BPF prog-id=120 op=LOAD Mar 17 22:05:15.102000 audit[2517]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0002abf18 items=0 ppid=2505 pid=2517 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:15.102000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161633235626235653936383139303535633438383766623931636431 Mar 17 22:05:15.103000 audit: BPF prog-id=120 op=UNLOAD Mar 17 22:05:15.103000 audit: BPF prog-id=119 op=UNLOAD Mar 17 22:05:15.103000 audit[2517]: AVC avc: denied { bpf } for pid=2517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:15.103000 audit[2517]: AVC avc: denied { bpf } for pid=2517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:15.103000 audit[2517]: AVC avc: denied { bpf } for pid=2517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:15.103000 audit[2517]: AVC avc: denied { perfmon } for pid=2517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:15.103000 audit[2517]: AVC avc: denied { perfmon } for pid=2517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:15.103000 audit[2517]: AVC avc: denied { perfmon } for pid=2517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:15.103000 audit[2517]: AVC avc: denied { perfmon } for pid=2517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:15.103000 audit[2517]: AVC avc: denied { perfmon } for pid=2517 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:15.103000 audit[2517]: AVC avc: denied { bpf } for pid=2517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:15.103000 audit[2517]: AVC avc: denied { bpf } for pid=2517 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:15.103000 audit: BPF prog-id=121 op=LOAD Mar 17 22:05:15.103000 audit[2517]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c000306328 items=0 ppid=2505 pid=2517 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:15.103000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161633235626235653936383139303535633438383766623931636431 Mar 17 22:05:15.192683 env[1205]: time="2025-03-17T22:05:15.192609241Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-cw6hs,Uid:1d16d892-069a-48a5-b68f-eb22b6af1e49,Namespace:calico-system,Attempt:0,} returns sandbox id \"aac25bb5e96819055c4887fb91cd1be38a154a25dca346a62f486d196cd98763\"" Mar 17 22:05:15.197577 env[1205]: time="2025-03-17T22:05:15.197508305Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\"" Mar 17 22:05:15.203896 kubelet[2045]: E0317 22:05:15.203728 2045 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 22:05:15.203896 kubelet[2045]: W0317 22:05:15.203778 2045 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 22:05:15.203896 kubelet[2045]: E0317 22:05:15.203808 2045 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 22:05:15.254862 sshd[2413]: Failed password for invalid user es from 143.110.184.217 port 54532 ssh2 Mar 17 22:05:15.304772 kubelet[2045]: E0317 22:05:15.304717 2045 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 22:05:15.304772 kubelet[2045]: W0317 22:05:15.304757 2045 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 22:05:15.304772 kubelet[2045]: E0317 22:05:15.304786 2045 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 22:05:15.305187 kubelet[2045]: E0317 22:05:15.305093 2045 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 22:05:15.305187 kubelet[2045]: W0317 22:05:15.305108 2045 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 22:05:15.305187 kubelet[2045]: E0317 22:05:15.305124 2045 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 22:05:15.305642 kubelet[2045]: E0317 22:05:15.305612 2045 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 22:05:15.305642 kubelet[2045]: W0317 22:05:15.305634 2045 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 22:05:15.305798 kubelet[2045]: E0317 22:05:15.305667 2045 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 22:05:15.305998 kubelet[2045]: E0317 22:05:15.305966 2045 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 22:05:15.305998 kubelet[2045]: W0317 22:05:15.305991 2045 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 22:05:15.306165 kubelet[2045]: E0317 22:05:15.306008 2045 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 22:05:15.306449 kubelet[2045]: E0317 22:05:15.306424 2045 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 22:05:15.306449 kubelet[2045]: W0317 22:05:15.306445 2045 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 22:05:15.306626 kubelet[2045]: E0317 22:05:15.306462 2045 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 22:05:15.308117 kubelet[2045]: E0317 22:05:15.308039 2045 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 22:05:15.308117 kubelet[2045]: W0317 22:05:15.308062 2045 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 22:05:15.308117 kubelet[2045]: E0317 22:05:15.308079 2045 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 22:05:15.341512 env[1205]: time="2025-03-17T22:05:15.341451153Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-764dc47956-2xc9t,Uid:50484d0b-39bd-462d-98e3-eb79fe0d8834,Namespace:calico-system,Attempt:0,}" Mar 17 22:05:15.371429 env[1205]: time="2025-03-17T22:05:15.371307455Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Mar 17 22:05:15.371758 env[1205]: time="2025-03-17T22:05:15.371711974Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Mar 17 22:05:15.371934 env[1205]: time="2025-03-17T22:05:15.371890365Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Mar 17 22:05:15.372372 env[1205]: time="2025-03-17T22:05:15.372313994Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6f4ca9bd712f1822f6f3ac443ca305f0a22b6c66196faf5469ae010db5b67f18 pid=2556 runtime=io.containerd.runc.v2 Mar 17 22:05:15.404068 systemd[1]: Started cri-containerd-6f4ca9bd712f1822f6f3ac443ca305f0a22b6c66196faf5469ae010db5b67f18.scope. Mar 17 22:05:15.439000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:15.439000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:15.439000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:15.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:15.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:15.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:15.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:15.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:15.439000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:15.439000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:15.439000 audit: BPF prog-id=122 op=LOAD Mar 17 22:05:15.440000 audit[2567]: AVC avc: denied { bpf } for pid=2567 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:15.440000 audit[2567]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014bc48 a2=10 a3=1c items=0 ppid=2556 pid=2567 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:15.440000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666346361396264373132663138323266366633616334343363613330 Mar 17 22:05:15.440000 audit[2567]: AVC avc: denied { perfmon } for pid=2567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:15.440000 audit[2567]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014b6b0 a2=3c a3=c items=0 ppid=2556 pid=2567 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:15.440000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666346361396264373132663138323266366633616334343363613330 Mar 17 22:05:15.440000 audit[2567]: AVC avc: denied { bpf } for pid=2567 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:15.440000 audit[2567]: AVC avc: denied { bpf } for pid=2567 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:15.440000 audit[2567]: AVC avc: denied { bpf } for pid=2567 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:15.440000 audit[2567]: AVC avc: denied { perfmon } for pid=2567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:15.440000 audit[2567]: AVC avc: denied { perfmon } for pid=2567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:15.440000 audit[2567]: AVC avc: denied { perfmon } for pid=2567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:15.440000 audit[2567]: AVC avc: denied { perfmon } for pid=2567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:15.440000 audit[2567]: AVC avc: denied { perfmon } for pid=2567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:15.440000 audit[2567]: AVC avc: denied { bpf } for pid=2567 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:15.440000 audit[2567]: AVC avc: denied { bpf } for pid=2567 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:15.440000 audit: BPF prog-id=123 op=LOAD Mar 17 22:05:15.440000 audit[2567]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014b9d8 a2=78 a3=c00022ddc0 items=0 ppid=2556 pid=2567 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:15.440000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666346361396264373132663138323266366633616334343363613330 Mar 17 22:05:15.440000 audit[2567]: AVC avc: denied { bpf } for pid=2567 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:15.440000 audit[2567]: AVC avc: denied { bpf } for pid=2567 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:15.440000 audit[2567]: AVC avc: denied { perfmon } for pid=2567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:15.440000 audit[2567]: AVC avc: denied { perfmon } for pid=2567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:15.440000 audit[2567]: AVC avc: denied { perfmon } for pid=2567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:15.440000 audit[2567]: AVC avc: denied { perfmon } for pid=2567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:15.440000 audit[2567]: AVC avc: denied { perfmon } for pid=2567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:15.440000 audit[2567]: AVC avc: denied { bpf } for pid=2567 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:15.440000 audit[2567]: AVC avc: denied { bpf } for pid=2567 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:15.440000 audit: BPF prog-id=124 op=LOAD Mar 17 22:05:15.440000 audit[2567]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014b770 a2=78 a3=c00022de08 items=0 ppid=2556 pid=2567 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:15.440000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666346361396264373132663138323266366633616334343363613330 Mar 17 22:05:15.440000 audit: BPF prog-id=124 op=UNLOAD Mar 17 22:05:15.440000 audit: BPF prog-id=123 op=UNLOAD Mar 17 22:05:15.440000 audit[2567]: AVC avc: denied { bpf } for pid=2567 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:15.440000 audit[2567]: AVC avc: denied { bpf } for pid=2567 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:15.440000 audit[2567]: AVC avc: denied { bpf } for pid=2567 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:15.440000 audit[2567]: AVC avc: denied { perfmon } for pid=2567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:15.440000 audit[2567]: AVC avc: denied { perfmon } for pid=2567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:15.440000 audit[2567]: AVC avc: denied { perfmon } for pid=2567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:15.440000 audit[2567]: AVC avc: denied { perfmon } for pid=2567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:15.440000 audit[2567]: AVC avc: denied { perfmon } for pid=2567 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:15.440000 audit[2567]: AVC avc: denied { bpf } for pid=2567 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:15.440000 audit[2567]: AVC avc: denied { bpf } for pid=2567 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:15.440000 audit: BPF prog-id=125 op=LOAD Mar 17 22:05:15.440000 audit[2567]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014bc30 a2=78 a3=c00027e218 items=0 ppid=2556 pid=2567 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:15.440000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666346361396264373132663138323266366633616334343363613330 Mar 17 22:05:15.505241 env[1205]: time="2025-03-17T22:05:15.505151627Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-764dc47956-2xc9t,Uid:50484d0b-39bd-462d-98e3-eb79fe0d8834,Namespace:calico-system,Attempt:0,} returns sandbox id \"6f4ca9bd712f1822f6f3ac443ca305f0a22b6c66196faf5469ae010db5b67f18\"" Mar 17 22:05:15.590743 kubelet[2045]: E0317 22:05:15.590641 2045 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-8qsmb" podUID="72a58b73-e5b8-4cf5-bcd4-e7ba6f464863" Mar 17 22:05:16.451649 sshd[2413]: Connection closed by invalid user es 143.110.184.217 port 54532 [preauth] Mar 17 22:05:16.455000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.244.26.146:22-143.110.184.217:54532 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:05:16.455273 systemd[1]: sshd@18-10.244.26.146:22-143.110.184.217:54532.service: Deactivated successfully. Mar 17 22:05:17.140557 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1670569569.mount: Deactivated successfully. Mar 17 22:05:17.529706 env[1205]: time="2025-03-17T22:05:17.529639189Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 22:05:17.532996 env[1205]: time="2025-03-17T22:05:17.532940923Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 22:05:17.536169 env[1205]: time="2025-03-17T22:05:17.536100426Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 22:05:17.538934 env[1205]: time="2025-03-17T22:05:17.538895809Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:a63f8b4ff531912d12d143664eb263fdbc6cd7b3ff4aa777dfb6e318a090462c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 22:05:17.540786 env[1205]: time="2025-03-17T22:05:17.540709526Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\" returns image reference \"sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6\"" Mar 17 22:05:17.543297 env[1205]: time="2025-03-17T22:05:17.543253199Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.1\"" Mar 17 22:05:17.544517 env[1205]: time="2025-03-17T22:05:17.544476500Z" level=info msg="CreateContainer within sandbox \"aac25bb5e96819055c4887fb91cd1be38a154a25dca346a62f486d196cd98763\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Mar 17 22:05:17.573533 env[1205]: time="2025-03-17T22:05:17.573449100Z" level=info msg="CreateContainer within sandbox \"aac25bb5e96819055c4887fb91cd1be38a154a25dca346a62f486d196cd98763\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"e24cad579c53d7af42819cd52d088c8fa5e1ed4e8d7fa1f6e4676d8d27d9a4f9\"" Mar 17 22:05:17.574581 env[1205]: time="2025-03-17T22:05:17.574499453Z" level=info msg="StartContainer for \"e24cad579c53d7af42819cd52d088c8fa5e1ed4e8d7fa1f6e4676d8d27d9a4f9\"" Mar 17 22:05:17.592334 kubelet[2045]: E0317 22:05:17.591680 2045 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-8qsmb" podUID="72a58b73-e5b8-4cf5-bcd4-e7ba6f464863" Mar 17 22:05:17.632619 systemd[1]: Started cri-containerd-e24cad579c53d7af42819cd52d088c8fa5e1ed4e8d7fa1f6e4676d8d27d9a4f9.scope. Mar 17 22:05:17.697000 audit[2598]: AVC avc: denied { perfmon } for pid=2598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:17.697000 audit[2598]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f1df1acfa88 items=0 ppid=2505 pid=2598 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:17.697000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532346361643537396335336437616634323831396364353264303838 Mar 17 22:05:17.698000 audit[2598]: AVC avc: denied { bpf } for pid=2598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:17.698000 audit[2598]: AVC avc: denied { bpf } for pid=2598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:17.698000 audit[2598]: AVC avc: denied { bpf } for pid=2598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:17.698000 audit[2598]: AVC avc: denied { perfmon } for pid=2598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:17.698000 audit[2598]: AVC avc: denied { perfmon } for pid=2598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:17.698000 audit[2598]: AVC avc: denied { perfmon } for pid=2598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:17.698000 audit[2598]: AVC avc: denied { perfmon } for pid=2598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:17.698000 audit[2598]: AVC avc: denied { perfmon } for pid=2598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:17.698000 audit[2598]: AVC avc: denied { bpf } for pid=2598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:17.698000 audit[2598]: AVC avc: denied { bpf } for pid=2598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:17.698000 audit: BPF prog-id=126 op=LOAD Mar 17 22:05:17.698000 audit[2598]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c00022c5e8 items=0 ppid=2505 pid=2598 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:17.698000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532346361643537396335336437616634323831396364353264303838 Mar 17 22:05:17.699000 audit[2598]: AVC avc: denied { bpf } for pid=2598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:17.699000 audit[2598]: AVC avc: denied { bpf } for pid=2598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:17.699000 audit[2598]: AVC avc: denied { perfmon } for pid=2598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:17.699000 audit[2598]: AVC avc: denied { perfmon } for pid=2598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:17.699000 audit[2598]: AVC avc: denied { perfmon } for pid=2598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:17.699000 audit[2598]: AVC avc: denied { perfmon } for pid=2598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:17.699000 audit[2598]: AVC avc: denied { perfmon } for pid=2598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:17.699000 audit[2598]: AVC avc: denied { bpf } for pid=2598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:17.699000 audit[2598]: AVC avc: denied { bpf } for pid=2598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:17.699000 audit: BPF prog-id=127 op=LOAD Mar 17 22:05:17.699000 audit[2598]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c00022c638 items=0 ppid=2505 pid=2598 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:17.699000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532346361643537396335336437616634323831396364353264303838 Mar 17 22:05:17.700000 audit: BPF prog-id=127 op=UNLOAD Mar 17 22:05:17.701000 audit: BPF prog-id=126 op=UNLOAD Mar 17 22:05:17.701000 audit[2598]: AVC avc: denied { bpf } for pid=2598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:17.701000 audit[2598]: AVC avc: denied { bpf } for pid=2598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:17.701000 audit[2598]: AVC avc: denied { bpf } for pid=2598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:17.701000 audit[2598]: AVC avc: denied { perfmon } for pid=2598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:17.701000 audit[2598]: AVC avc: denied { perfmon } for pid=2598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:17.701000 audit[2598]: AVC avc: denied { perfmon } for pid=2598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:17.701000 audit[2598]: AVC avc: denied { perfmon } for pid=2598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:17.701000 audit[2598]: AVC avc: denied { perfmon } for pid=2598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:17.701000 audit[2598]: AVC avc: denied { bpf } for pid=2598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:17.701000 audit[2598]: AVC avc: denied { bpf } for pid=2598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:17.701000 audit: BPF prog-id=128 op=LOAD Mar 17 22:05:17.701000 audit[2598]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c00022c6c8 items=0 ppid=2505 pid=2598 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:17.701000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532346361643537396335336437616634323831396364353264303838 Mar 17 22:05:17.736679 env[1205]: time="2025-03-17T22:05:17.736617822Z" level=info msg="StartContainer for \"e24cad579c53d7af42819cd52d088c8fa5e1ed4e8d7fa1f6e4676d8d27d9a4f9\" returns successfully" Mar 17 22:05:17.795326 systemd[1]: cri-containerd-e24cad579c53d7af42819cd52d088c8fa5e1ed4e8d7fa1f6e4676d8d27d9a4f9.scope: Deactivated successfully. Mar 17 22:05:17.798000 audit: BPF prog-id=128 op=UNLOAD Mar 17 22:05:17.942085 env[1205]: time="2025-03-17T22:05:17.942003724Z" level=info msg="shim disconnected" id=e24cad579c53d7af42819cd52d088c8fa5e1ed4e8d7fa1f6e4676d8d27d9a4f9 Mar 17 22:05:17.942568 env[1205]: time="2025-03-17T22:05:17.942521076Z" level=warning msg="cleaning up after shim disconnected" id=e24cad579c53d7af42819cd52d088c8fa5e1ed4e8d7fa1f6e4676d8d27d9a4f9 namespace=k8s.io Mar 17 22:05:17.942725 env[1205]: time="2025-03-17T22:05:17.942695166Z" level=info msg="cleaning up dead shim" Mar 17 22:05:17.957281 env[1205]: time="2025-03-17T22:05:17.957154558Z" level=warning msg="cleanup warnings time=\"2025-03-17T22:05:17Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2639 runtime=io.containerd.runc.v2\n" Mar 17 22:05:18.055642 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-e24cad579c53d7af42819cd52d088c8fa5e1ed4e8d7fa1f6e4676d8d27d9a4f9-rootfs.mount: Deactivated successfully. Mar 17 22:05:19.591578 kubelet[2045]: E0317 22:05:19.591413 2045 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-8qsmb" podUID="72a58b73-e5b8-4cf5-bcd4-e7ba6f464863" Mar 17 22:05:21.074394 env[1205]: time="2025-03-17T22:05:21.073276902Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 22:05:21.078151 env[1205]: time="2025-03-17T22:05:21.078077344Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4cb3738506f5a9c530033d1e24fd6b9ec618518a2ec8b012ded33572be06ab44,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 22:05:21.126899 env[1205]: time="2025-03-17T22:05:21.126813669Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 22:05:21.233149 env[1205]: time="2025-03-17T22:05:21.233029286Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.1\" returns image reference \"sha256:4cb3738506f5a9c530033d1e24fd6b9ec618518a2ec8b012ded33572be06ab44\"" Mar 17 22:05:21.233651 env[1205]: time="2025-03-17T22:05:21.233495090Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:768a194e1115c73bcbf35edb7afd18a63e16e08d940c79993565b6a3cca2da7c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 22:05:21.236363 env[1205]: time="2025-03-17T22:05:21.235925233Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\"" Mar 17 22:05:21.284842 env[1205]: time="2025-03-17T22:05:21.284777916Z" level=info msg="CreateContainer within sandbox \"6f4ca9bd712f1822f6f3ac443ca305f0a22b6c66196faf5469ae010db5b67f18\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Mar 17 22:05:21.304808 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3825747839.mount: Deactivated successfully. Mar 17 22:05:21.311112 env[1205]: time="2025-03-17T22:05:21.311029794Z" level=info msg="CreateContainer within sandbox \"6f4ca9bd712f1822f6f3ac443ca305f0a22b6c66196faf5469ae010db5b67f18\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"ea57e558893b9a25637fdbd28464b01422e3ac94a7745eb9915536f37b9a08ba\"" Mar 17 22:05:21.314000 env[1205]: time="2025-03-17T22:05:21.312144333Z" level=info msg="StartContainer for \"ea57e558893b9a25637fdbd28464b01422e3ac94a7745eb9915536f37b9a08ba\"" Mar 17 22:05:21.348314 systemd[1]: Started cri-containerd-ea57e558893b9a25637fdbd28464b01422e3ac94a7745eb9915536f37b9a08ba.scope. Mar 17 22:05:21.383000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:21.390139 kernel: kauditd_printk_skb: 149 callbacks suppressed Mar 17 22:05:21.390234 kernel: audit: type=1400 audit(1742249121.383:1010): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:21.383000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:21.403774 kernel: audit: type=1400 audit(1742249121.383:1011): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:21.383000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:21.383000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:21.417642 kernel: audit: type=1400 audit(1742249121.383:1012): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:21.417835 kernel: audit: type=1400 audit(1742249121.383:1013): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:21.417908 kernel: audit: type=1400 audit(1742249121.383:1014): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:21.383000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:21.383000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:21.383000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:21.433374 kernel: audit: type=1400 audit(1742249121.383:1015): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:21.433601 kernel: audit: type=1400 audit(1742249121.383:1016): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:21.383000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:21.442642 kernel: audit: type=1400 audit(1742249121.383:1017): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:21.383000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:21.448612 kernel: audit: type=1400 audit(1742249121.383:1018): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:21.393000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:21.393000 audit: BPF prog-id=129 op=LOAD Mar 17 22:05:21.394000 audit[2672]: AVC avc: denied { bpf } for pid=2672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:21.394000 audit[2672]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2556 pid=2672 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:21.394000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561353765353538383933623961323536333766646264323834363462 Mar 17 22:05:21.455587 kernel: audit: type=1400 audit(1742249121.393:1019): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:21.394000 audit[2672]: AVC avc: denied { perfmon } for pid=2672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:21.394000 audit[2672]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=2556 pid=2672 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:21.394000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561353765353538383933623961323536333766646264323834363462 Mar 17 22:05:21.394000 audit[2672]: AVC avc: denied { bpf } for pid=2672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:21.394000 audit[2672]: AVC avc: denied { bpf } for pid=2672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:21.394000 audit[2672]: AVC avc: denied { bpf } for pid=2672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:21.394000 audit[2672]: AVC avc: denied { perfmon } for pid=2672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:21.394000 audit[2672]: AVC avc: denied { perfmon } for pid=2672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:21.394000 audit[2672]: AVC avc: denied { perfmon } for pid=2672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:21.394000 audit[2672]: AVC avc: denied { perfmon } for pid=2672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:21.394000 audit[2672]: AVC avc: denied { perfmon } for pid=2672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:21.394000 audit[2672]: AVC avc: denied { bpf } for pid=2672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:21.394000 audit[2672]: AVC avc: denied { bpf } for pid=2672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:21.394000 audit: BPF prog-id=130 op=LOAD Mar 17 22:05:21.394000 audit[2672]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c00020e390 items=0 ppid=2556 pid=2672 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:21.394000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561353765353538383933623961323536333766646264323834363462 Mar 17 22:05:21.394000 audit[2672]: AVC avc: denied { bpf } for pid=2672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:21.394000 audit[2672]: AVC avc: denied { bpf } for pid=2672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:21.394000 audit[2672]: AVC avc: denied { perfmon } for pid=2672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:21.394000 audit[2672]: AVC avc: denied { perfmon } for pid=2672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:21.394000 audit[2672]: AVC avc: denied { perfmon } for pid=2672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:21.394000 audit[2672]: AVC avc: denied { perfmon } for pid=2672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:21.394000 audit[2672]: AVC avc: denied { perfmon } for pid=2672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:21.394000 audit[2672]: AVC avc: denied { bpf } for pid=2672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:21.394000 audit[2672]: AVC avc: denied { bpf } for pid=2672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:21.394000 audit: BPF prog-id=131 op=LOAD Mar 17 22:05:21.394000 audit[2672]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c00020e3d8 items=0 ppid=2556 pid=2672 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:21.394000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561353765353538383933623961323536333766646264323834363462 Mar 17 22:05:21.395000 audit: BPF prog-id=131 op=UNLOAD Mar 17 22:05:21.395000 audit: BPF prog-id=130 op=UNLOAD Mar 17 22:05:21.395000 audit[2672]: AVC avc: denied { bpf } for pid=2672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:21.395000 audit[2672]: AVC avc: denied { bpf } for pid=2672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:21.395000 audit[2672]: AVC avc: denied { bpf } for pid=2672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:21.395000 audit[2672]: AVC avc: denied { perfmon } for pid=2672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:21.395000 audit[2672]: AVC avc: denied { perfmon } for pid=2672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:21.395000 audit[2672]: AVC avc: denied { perfmon } for pid=2672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:21.395000 audit[2672]: AVC avc: denied { perfmon } for pid=2672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:21.395000 audit[2672]: AVC avc: denied { perfmon } for pid=2672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:21.395000 audit[2672]: AVC avc: denied { bpf } for pid=2672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:21.395000 audit[2672]: AVC avc: denied { bpf } for pid=2672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:21.395000 audit: BPF prog-id=132 op=LOAD Mar 17 22:05:21.395000 audit[2672]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c00020e7e8 items=0 ppid=2556 pid=2672 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:21.395000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561353765353538383933623961323536333766646264323834363462 Mar 17 22:05:21.481121 env[1205]: time="2025-03-17T22:05:21.481038905Z" level=info msg="StartContainer for \"ea57e558893b9a25637fdbd28464b01422e3ac94a7745eb9915536f37b9a08ba\" returns successfully" Mar 17 22:05:21.591118 kubelet[2045]: E0317 22:05:21.591040 2045 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-8qsmb" podUID="72a58b73-e5b8-4cf5-bcd4-e7ba6f464863" Mar 17 22:05:21.758442 kubelet[2045]: I0317 22:05:21.758342 2045 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-764dc47956-2xc9t" podStartSLOduration=3.029927743 podStartE2EDuration="8.758303129s" podCreationTimestamp="2025-03-17 22:05:13 +0000 UTC" firstStartedPulling="2025-03-17 22:05:15.507302979 +0000 UTC m=+15.183677486" lastFinishedPulling="2025-03-17 22:05:21.235678359 +0000 UTC m=+20.912052872" observedRunningTime="2025-03-17 22:05:21.755340931 +0000 UTC m=+21.431715449" watchObservedRunningTime="2025-03-17 22:05:21.758303129 +0000 UTC m=+21.434677643" Mar 17 22:05:22.718136 kubelet[2045]: I0317 22:05:22.716118 2045 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Mar 17 22:05:23.115000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.244.26.146:22-143.110.184.217:45344 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:05:23.116351 systemd[1]: Started sshd@19-10.244.26.146:22-143.110.184.217:45344.service. Mar 17 22:05:23.593525 kubelet[2045]: E0317 22:05:23.590947 2045 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-8qsmb" podUID="72a58b73-e5b8-4cf5-bcd4-e7ba6f464863" Mar 17 22:05:23.863650 sshd[2704]: Invalid user sftp from 143.110.184.217 port 45344 Mar 17 22:05:24.025793 sshd[2704]: pam_faillock(sshd:auth): User unknown Mar 17 22:05:24.026786 sshd[2704]: pam_unix(sshd:auth): check pass; user unknown Mar 17 22:05:24.026847 sshd[2704]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.110.184.217 Mar 17 22:05:24.027854 sshd[2704]: pam_faillock(sshd:auth): User unknown Mar 17 22:05:24.026000 audit[2704]: USER_AUTH pid=2704 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="sftp" exe="/usr/sbin/sshd" hostname=143.110.184.217 addr=143.110.184.217 terminal=ssh res=failed' Mar 17 22:05:25.078828 kubelet[2045]: I0317 22:05:25.078228 2045 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Mar 17 22:05:25.154000 audit[2707]: NETFILTER_CFG table=filter:95 family=2 entries=17 op=nft_register_rule pid=2707 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 22:05:25.154000 audit[2707]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffe44c628b0 a2=0 a3=7ffe44c6289c items=0 ppid=2206 pid=2707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:25.154000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 22:05:25.160000 audit[2707]: NETFILTER_CFG table=nat:96 family=2 entries=19 op=nft_register_chain pid=2707 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 22:05:25.160000 audit[2707]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffe44c628b0 a2=0 a3=7ffe44c6289c items=0 ppid=2206 pid=2707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:25.160000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 22:05:25.572889 sshd[2704]: Failed password for invalid user sftp from 143.110.184.217 port 45344 ssh2 Mar 17 22:05:25.590577 kubelet[2045]: E0317 22:05:25.590052 2045 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-8qsmb" podUID="72a58b73-e5b8-4cf5-bcd4-e7ba6f464863" Mar 17 22:05:27.235452 sshd[2704]: Connection closed by invalid user sftp 143.110.184.217 port 45344 [preauth] Mar 17 22:05:27.237440 systemd[1]: sshd@19-10.244.26.146:22-143.110.184.217:45344.service: Deactivated successfully. Mar 17 22:05:27.244222 kernel: kauditd_printk_skb: 55 callbacks suppressed Mar 17 22:05:27.244348 kernel: audit: type=1131 audit(1742249127.236:1032): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.244.26.146:22-143.110.184.217:45344 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:05:27.236000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.244.26.146:22-143.110.184.217:45344 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:05:27.595018 kubelet[2045]: E0317 22:05:27.590153 2045 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-8qsmb" podUID="72a58b73-e5b8-4cf5-bcd4-e7ba6f464863" Mar 17 22:05:28.896457 env[1205]: time="2025-03-17T22:05:28.896394393Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 22:05:28.898947 env[1205]: time="2025-03-17T22:05:28.898898796Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 22:05:28.901571 env[1205]: time="2025-03-17T22:05:28.901516113Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 22:05:28.903650 env[1205]: time="2025-03-17T22:05:28.903604982Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:21e759d51c90dfb34fc1397dc180dd3a3fb564c2b0580d2f61ffe108f2a3c94b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 22:05:28.904500 env[1205]: time="2025-03-17T22:05:28.904448394Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\" returns image reference \"sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e\"" Mar 17 22:05:28.909685 env[1205]: time="2025-03-17T22:05:28.909591747Z" level=info msg="CreateContainer within sandbox \"aac25bb5e96819055c4887fb91cd1be38a154a25dca346a62f486d196cd98763\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Mar 17 22:05:28.935066 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1646999006.mount: Deactivated successfully. Mar 17 22:05:28.945589 env[1205]: time="2025-03-17T22:05:28.945464879Z" level=info msg="CreateContainer within sandbox \"aac25bb5e96819055c4887fb91cd1be38a154a25dca346a62f486d196cd98763\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"0db8d950084fe727791897260fffac4e75880b46f1ea9dc75663df332c7b6a7f\"" Mar 17 22:05:28.948777 env[1205]: time="2025-03-17T22:05:28.946921306Z" level=info msg="StartContainer for \"0db8d950084fe727791897260fffac4e75880b46f1ea9dc75663df332c7b6a7f\"" Mar 17 22:05:29.008225 systemd[1]: Started cri-containerd-0db8d950084fe727791897260fffac4e75880b46f1ea9dc75663df332c7b6a7f.scope. Mar 17 22:05:29.046000 audit[2717]: AVC avc: denied { perfmon } for pid=2717 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:29.046000 audit[2717]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f52b94170a8 items=0 ppid=2505 pid=2717 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:29.066731 kernel: audit: type=1400 audit(1742249129.046:1033): avc: denied { perfmon } for pid=2717 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:29.066932 kernel: audit: type=1300 audit(1742249129.046:1033): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f52b94170a8 items=0 ppid=2505 pid=2717 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:29.066997 kernel: audit: type=1327 audit(1742249129.046:1033): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064623864393530303834666537323737393138393732363066666661 Mar 17 22:05:29.046000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064623864393530303834666537323737393138393732363066666661 Mar 17 22:05:29.072661 kernel: audit: type=1400 audit(1742249129.046:1034): avc: denied { bpf } for pid=2717 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:29.046000 audit[2717]: AVC avc: denied { bpf } for pid=2717 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:29.082915 kernel: audit: type=1400 audit(1742249129.046:1034): avc: denied { bpf } for pid=2717 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:29.083076 kernel: audit: type=1400 audit(1742249129.046:1034): avc: denied { bpf } for pid=2717 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:29.046000 audit[2717]: AVC avc: denied { bpf } for pid=2717 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:29.046000 audit[2717]: AVC avc: denied { bpf } for pid=2717 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:29.046000 audit[2717]: AVC avc: denied { perfmon } for pid=2717 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:29.094958 kernel: audit: type=1400 audit(1742249129.046:1034): avc: denied { perfmon } for pid=2717 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:29.046000 audit[2717]: AVC avc: denied { perfmon } for pid=2717 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:29.102604 kernel: audit: type=1400 audit(1742249129.046:1034): avc: denied { perfmon } for pid=2717 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:29.046000 audit[2717]: AVC avc: denied { perfmon } for pid=2717 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:29.111751 kernel: audit: type=1400 audit(1742249129.046:1034): avc: denied { perfmon } for pid=2717 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:29.046000 audit[2717]: AVC avc: denied { perfmon } for pid=2717 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:29.046000 audit[2717]: AVC avc: denied { perfmon } for pid=2717 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:29.046000 audit[2717]: AVC avc: denied { bpf } for pid=2717 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:29.046000 audit[2717]: AVC avc: denied { bpf } for pid=2717 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:29.046000 audit: BPF prog-id=133 op=LOAD Mar 17 22:05:29.046000 audit[2717]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0001f8a18 items=0 ppid=2505 pid=2717 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:29.046000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064623864393530303834666537323737393138393732363066666661 Mar 17 22:05:29.056000 audit[2717]: AVC avc: denied { bpf } for pid=2717 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:29.056000 audit[2717]: AVC avc: denied { bpf } for pid=2717 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:29.056000 audit[2717]: AVC avc: denied { perfmon } for pid=2717 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:29.056000 audit[2717]: AVC avc: denied { perfmon } for pid=2717 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:29.056000 audit[2717]: AVC avc: denied { perfmon } for pid=2717 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:29.056000 audit[2717]: AVC avc: denied { perfmon } for pid=2717 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:29.056000 audit[2717]: AVC avc: denied { perfmon } for pid=2717 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:29.056000 audit[2717]: AVC avc: denied { bpf } for pid=2717 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:29.056000 audit[2717]: AVC avc: denied { bpf } for pid=2717 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:29.056000 audit: BPF prog-id=134 op=LOAD Mar 17 22:05:29.056000 audit[2717]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0001f8a68 items=0 ppid=2505 pid=2717 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:29.056000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064623864393530303834666537323737393138393732363066666661 Mar 17 22:05:29.056000 audit: BPF prog-id=134 op=UNLOAD Mar 17 22:05:29.056000 audit: BPF prog-id=133 op=UNLOAD Mar 17 22:05:29.056000 audit[2717]: AVC avc: denied { bpf } for pid=2717 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:29.056000 audit[2717]: AVC avc: denied { bpf } for pid=2717 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:29.056000 audit[2717]: AVC avc: denied { bpf } for pid=2717 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:29.056000 audit[2717]: AVC avc: denied { perfmon } for pid=2717 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:29.056000 audit[2717]: AVC avc: denied { perfmon } for pid=2717 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:29.056000 audit[2717]: AVC avc: denied { perfmon } for pid=2717 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:29.056000 audit[2717]: AVC avc: denied { perfmon } for pid=2717 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:29.056000 audit[2717]: AVC avc: denied { perfmon } for pid=2717 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:29.056000 audit[2717]: AVC avc: denied { bpf } for pid=2717 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:29.056000 audit[2717]: AVC avc: denied { bpf } for pid=2717 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:29.056000 audit: BPF prog-id=135 op=LOAD Mar 17 22:05:29.056000 audit[2717]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0001f8af8 items=0 ppid=2505 pid=2717 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:29.056000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064623864393530303834666537323737393138393732363066666661 Mar 17 22:05:29.131014 env[1205]: time="2025-03-17T22:05:29.130944440Z" level=info msg="StartContainer for \"0db8d950084fe727791897260fffac4e75880b46f1ea9dc75663df332c7b6a7f\" returns successfully" Mar 17 22:05:29.591008 kubelet[2045]: E0317 22:05:29.590921 2045 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-8qsmb" podUID="72a58b73-e5b8-4cf5-bcd4-e7ba6f464863" Mar 17 22:05:29.928721 systemd[1]: run-containerd-runc-k8s.io-0db8d950084fe727791897260fffac4e75880b46f1ea9dc75663df332c7b6a7f-runc.eP4WXN.mount: Deactivated successfully. Mar 17 22:05:30.131281 env[1205]: time="2025-03-17T22:05:30.131158923Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Mar 17 22:05:30.135854 systemd[1]: cri-containerd-0db8d950084fe727791897260fffac4e75880b46f1ea9dc75663df332c7b6a7f.scope: Deactivated successfully. Mar 17 22:05:30.138000 audit: BPF prog-id=135 op=UNLOAD Mar 17 22:05:30.170463 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-0db8d950084fe727791897260fffac4e75880b46f1ea9dc75663df332c7b6a7f-rootfs.mount: Deactivated successfully. Mar 17 22:05:30.187304 env[1205]: time="2025-03-17T22:05:30.186628783Z" level=info msg="shim disconnected" id=0db8d950084fe727791897260fffac4e75880b46f1ea9dc75663df332c7b6a7f Mar 17 22:05:30.187304 env[1205]: time="2025-03-17T22:05:30.186716027Z" level=warning msg="cleaning up after shim disconnected" id=0db8d950084fe727791897260fffac4e75880b46f1ea9dc75663df332c7b6a7f namespace=k8s.io Mar 17 22:05:30.187304 env[1205]: time="2025-03-17T22:05:30.186736607Z" level=info msg="cleaning up dead shim" Mar 17 22:05:30.202084 env[1205]: time="2025-03-17T22:05:30.201989665Z" level=warning msg="cleanup warnings time=\"2025-03-17T22:05:30Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2756 runtime=io.containerd.runc.v2\n" Mar 17 22:05:30.215924 kubelet[2045]: I0317 22:05:30.214945 2045 kubelet_node_status.go:502] "Fast updating node status as it just became ready" Mar 17 22:05:30.270054 systemd[1]: Created slice kubepods-burstable-pod630555ef_bf08_4b1a_91a4_a1ce8eafa62c.slice. Mar 17 22:05:30.279736 systemd[1]: Created slice kubepods-burstable-poda82f42e7_3e9b_43f9_92e0_df21d942a638.slice. Mar 17 22:05:30.293496 systemd[1]: Created slice kubepods-besteffort-pod6c786678_3d62_47ad_93a5_369b9da92261.slice. Mar 17 22:05:30.304733 systemd[1]: Created slice kubepods-besteffort-pod62b3841b_0f84_466f_921a_c6f2f9062835.slice. Mar 17 22:05:30.315544 systemd[1]: Created slice kubepods-besteffort-pod58155caf_9ac0_4f91_81aa_f85d1f16be02.slice. Mar 17 22:05:30.360284 kubelet[2045]: I0317 22:05:30.360212 2045 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-d5wrd\" (UniqueName: \"kubernetes.io/projected/6c786678-3d62-47ad-93a5-369b9da92261-kube-api-access-d5wrd\") pod \"calico-apiserver-9cf959fb7-wc2pd\" (UID: \"6c786678-3d62-47ad-93a5-369b9da92261\") " pod="calico-apiserver/calico-apiserver-9cf959fb7-wc2pd" Mar 17 22:05:30.360284 kubelet[2045]: I0317 22:05:30.360290 2045 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/62b3841b-0f84-466f-921a-c6f2f9062835-tigera-ca-bundle\") pod \"calico-kube-controllers-df4ccfbfc-h8m5j\" (UID: \"62b3841b-0f84-466f-921a-c6f2f9062835\") " pod="calico-system/calico-kube-controllers-df4ccfbfc-h8m5j" Mar 17 22:05:30.360655 kubelet[2045]: I0317 22:05:30.360327 2045 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-2bj74\" (UniqueName: \"kubernetes.io/projected/62b3841b-0f84-466f-921a-c6f2f9062835-kube-api-access-2bj74\") pod \"calico-kube-controllers-df4ccfbfc-h8m5j\" (UID: \"62b3841b-0f84-466f-921a-c6f2f9062835\") " pod="calico-system/calico-kube-controllers-df4ccfbfc-h8m5j" Mar 17 22:05:30.360655 kubelet[2045]: I0317 22:05:30.360366 2045 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/58155caf-9ac0-4f91-81aa-f85d1f16be02-calico-apiserver-certs\") pod \"calico-apiserver-9cf959fb7-6grpc\" (UID: \"58155caf-9ac0-4f91-81aa-f85d1f16be02\") " pod="calico-apiserver/calico-apiserver-9cf959fb7-6grpc" Mar 17 22:05:30.360655 kubelet[2045]: I0317 22:05:30.360404 2045 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-rcjwk\" (UniqueName: \"kubernetes.io/projected/a82f42e7-3e9b-43f9-92e0-df21d942a638-kube-api-access-rcjwk\") pod \"coredns-668d6bf9bc-hksfn\" (UID: \"a82f42e7-3e9b-43f9-92e0-df21d942a638\") " pod="kube-system/coredns-668d6bf9bc-hksfn" Mar 17 22:05:30.360655 kubelet[2045]: I0317 22:05:30.360434 2045 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/6c786678-3d62-47ad-93a5-369b9da92261-calico-apiserver-certs\") pod \"calico-apiserver-9cf959fb7-wc2pd\" (UID: \"6c786678-3d62-47ad-93a5-369b9da92261\") " pod="calico-apiserver/calico-apiserver-9cf959fb7-wc2pd" Mar 17 22:05:30.360655 kubelet[2045]: I0317 22:05:30.360464 2045 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-mfx5k\" (UniqueName: \"kubernetes.io/projected/630555ef-bf08-4b1a-91a4-a1ce8eafa62c-kube-api-access-mfx5k\") pod \"coredns-668d6bf9bc-67bbv\" (UID: \"630555ef-bf08-4b1a-91a4-a1ce8eafa62c\") " pod="kube-system/coredns-668d6bf9bc-67bbv" Mar 17 22:05:30.361366 kubelet[2045]: I0317 22:05:30.360500 2045 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/a82f42e7-3e9b-43f9-92e0-df21d942a638-config-volume\") pod \"coredns-668d6bf9bc-hksfn\" (UID: \"a82f42e7-3e9b-43f9-92e0-df21d942a638\") " pod="kube-system/coredns-668d6bf9bc-hksfn" Mar 17 22:05:30.361366 kubelet[2045]: I0317 22:05:30.360532 2045 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-ccjz4\" (UniqueName: \"kubernetes.io/projected/58155caf-9ac0-4f91-81aa-f85d1f16be02-kube-api-access-ccjz4\") pod \"calico-apiserver-9cf959fb7-6grpc\" (UID: \"58155caf-9ac0-4f91-81aa-f85d1f16be02\") " pod="calico-apiserver/calico-apiserver-9cf959fb7-6grpc" Mar 17 22:05:30.361366 kubelet[2045]: I0317 22:05:30.360591 2045 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/630555ef-bf08-4b1a-91a4-a1ce8eafa62c-config-volume\") pod \"coredns-668d6bf9bc-67bbv\" (UID: \"630555ef-bf08-4b1a-91a4-a1ce8eafa62c\") " pod="kube-system/coredns-668d6bf9bc-67bbv" Mar 17 22:05:30.576348 env[1205]: time="2025-03-17T22:05:30.576086446Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-67bbv,Uid:630555ef-bf08-4b1a-91a4-a1ce8eafa62c,Namespace:kube-system,Attempt:0,}" Mar 17 22:05:30.588679 env[1205]: time="2025-03-17T22:05:30.585700945Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-hksfn,Uid:a82f42e7-3e9b-43f9-92e0-df21d942a638,Namespace:kube-system,Attempt:0,}" Mar 17 22:05:30.601584 env[1205]: time="2025-03-17T22:05:30.601193391Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-9cf959fb7-wc2pd,Uid:6c786678-3d62-47ad-93a5-369b9da92261,Namespace:calico-apiserver,Attempt:0,}" Mar 17 22:05:30.621418 env[1205]: time="2025-03-17T22:05:30.621345722Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-df4ccfbfc-h8m5j,Uid:62b3841b-0f84-466f-921a-c6f2f9062835,Namespace:calico-system,Attempt:0,}" Mar 17 22:05:30.654177 env[1205]: time="2025-03-17T22:05:30.654062571Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-9cf959fb7-6grpc,Uid:58155caf-9ac0-4f91-81aa-f85d1f16be02,Namespace:calico-apiserver,Attempt:0,}" Mar 17 22:05:30.760195 env[1205]: time="2025-03-17T22:05:30.760127047Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\"" Mar 17 22:05:31.086305 env[1205]: time="2025-03-17T22:05:31.086197287Z" level=error msg="Failed to destroy network for sandbox \"cf4c0eaa1785fa59168f93484a1e2dd4677bccc48d9f9b0dc40a0c9b3798b080\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 22:05:31.089860 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-cf4c0eaa1785fa59168f93484a1e2dd4677bccc48d9f9b0dc40a0c9b3798b080-shm.mount: Deactivated successfully. Mar 17 22:05:31.091459 env[1205]: time="2025-03-17T22:05:31.086597585Z" level=error msg="Failed to destroy network for sandbox \"86a1255a92a9fb66a96092bff74e8535b80b4ff61972ceec62ee6fd36ddf9498\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 22:05:31.094319 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-86a1255a92a9fb66a96092bff74e8535b80b4ff61972ceec62ee6fd36ddf9498-shm.mount: Deactivated successfully. Mar 17 22:05:31.096378 env[1205]: time="2025-03-17T22:05:31.096315497Z" level=error msg="encountered an error cleaning up failed sandbox \"86a1255a92a9fb66a96092bff74e8535b80b4ff61972ceec62ee6fd36ddf9498\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 22:05:31.096700 env[1205]: time="2025-03-17T22:05:31.096642063Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-hksfn,Uid:a82f42e7-3e9b-43f9-92e0-df21d942a638,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"86a1255a92a9fb66a96092bff74e8535b80b4ff61972ceec62ee6fd36ddf9498\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 22:05:31.097323 kubelet[2045]: E0317 22:05:31.097234 2045 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"86a1255a92a9fb66a96092bff74e8535b80b4ff61972ceec62ee6fd36ddf9498\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 22:05:31.102630 kubelet[2045]: E0317 22:05:31.099525 2045 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"86a1255a92a9fb66a96092bff74e8535b80b4ff61972ceec62ee6fd36ddf9498\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-668d6bf9bc-hksfn" Mar 17 22:05:31.102630 kubelet[2045]: E0317 22:05:31.099621 2045 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"86a1255a92a9fb66a96092bff74e8535b80b4ff61972ceec62ee6fd36ddf9498\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-668d6bf9bc-hksfn" Mar 17 22:05:31.102630 kubelet[2045]: E0317 22:05:31.099720 2045 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-668d6bf9bc-hksfn_kube-system(a82f42e7-3e9b-43f9-92e0-df21d942a638)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-668d6bf9bc-hksfn_kube-system(a82f42e7-3e9b-43f9-92e0-df21d942a638)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"86a1255a92a9fb66a96092bff74e8535b80b4ff61972ceec62ee6fd36ddf9498\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-668d6bf9bc-hksfn" podUID="a82f42e7-3e9b-43f9-92e0-df21d942a638" Mar 17 22:05:31.103519 env[1205]: time="2025-03-17T22:05:31.100338062Z" level=error msg="encountered an error cleaning up failed sandbox \"cf4c0eaa1785fa59168f93484a1e2dd4677bccc48d9f9b0dc40a0c9b3798b080\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 22:05:31.103519 env[1205]: time="2025-03-17T22:05:31.100463243Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-9cf959fb7-wc2pd,Uid:6c786678-3d62-47ad-93a5-369b9da92261,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"cf4c0eaa1785fa59168f93484a1e2dd4677bccc48d9f9b0dc40a0c9b3798b080\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 22:05:31.103880 kubelet[2045]: E0317 22:05:31.100756 2045 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"cf4c0eaa1785fa59168f93484a1e2dd4677bccc48d9f9b0dc40a0c9b3798b080\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 22:05:31.103880 kubelet[2045]: E0317 22:05:31.100799 2045 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"cf4c0eaa1785fa59168f93484a1e2dd4677bccc48d9f9b0dc40a0c9b3798b080\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-9cf959fb7-wc2pd" Mar 17 22:05:31.103880 kubelet[2045]: E0317 22:05:31.100826 2045 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"cf4c0eaa1785fa59168f93484a1e2dd4677bccc48d9f9b0dc40a0c9b3798b080\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-9cf959fb7-wc2pd" Mar 17 22:05:31.104053 kubelet[2045]: E0317 22:05:31.100869 2045 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-9cf959fb7-wc2pd_calico-apiserver(6c786678-3d62-47ad-93a5-369b9da92261)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-9cf959fb7-wc2pd_calico-apiserver(6c786678-3d62-47ad-93a5-369b9da92261)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"cf4c0eaa1785fa59168f93484a1e2dd4677bccc48d9f9b0dc40a0c9b3798b080\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-9cf959fb7-wc2pd" podUID="6c786678-3d62-47ad-93a5-369b9da92261" Mar 17 22:05:31.125520 env[1205]: time="2025-03-17T22:05:31.125411081Z" level=error msg="Failed to destroy network for sandbox \"84663afd621e7b0c4c243d86e5ea066a007eb77478f0a01766ef588875860094\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 22:05:31.128729 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-84663afd621e7b0c4c243d86e5ea066a007eb77478f0a01766ef588875860094-shm.mount: Deactivated successfully. Mar 17 22:05:31.130249 env[1205]: time="2025-03-17T22:05:31.130193183Z" level=error msg="encountered an error cleaning up failed sandbox \"84663afd621e7b0c4c243d86e5ea066a007eb77478f0a01766ef588875860094\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 22:05:31.130667 env[1205]: time="2025-03-17T22:05:31.130283377Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-67bbv,Uid:630555ef-bf08-4b1a-91a4-a1ce8eafa62c,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"84663afd621e7b0c4c243d86e5ea066a007eb77478f0a01766ef588875860094\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 22:05:31.130897 kubelet[2045]: E0317 22:05:31.130816 2045 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"84663afd621e7b0c4c243d86e5ea066a007eb77478f0a01766ef588875860094\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 22:05:31.131010 kubelet[2045]: E0317 22:05:31.130955 2045 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"84663afd621e7b0c4c243d86e5ea066a007eb77478f0a01766ef588875860094\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-668d6bf9bc-67bbv" Mar 17 22:05:31.131079 kubelet[2045]: E0317 22:05:31.131008 2045 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"84663afd621e7b0c4c243d86e5ea066a007eb77478f0a01766ef588875860094\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-668d6bf9bc-67bbv" Mar 17 22:05:31.133494 kubelet[2045]: E0317 22:05:31.131116 2045 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-668d6bf9bc-67bbv_kube-system(630555ef-bf08-4b1a-91a4-a1ce8eafa62c)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-668d6bf9bc-67bbv_kube-system(630555ef-bf08-4b1a-91a4-a1ce8eafa62c)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"84663afd621e7b0c4c243d86e5ea066a007eb77478f0a01766ef588875860094\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-668d6bf9bc-67bbv" podUID="630555ef-bf08-4b1a-91a4-a1ce8eafa62c" Mar 17 22:05:31.140949 env[1205]: time="2025-03-17T22:05:31.140871730Z" level=error msg="Failed to destroy network for sandbox \"94faf4a4aad38fb86162d25c57d5681e3f89b5073929530903b66db47c845f72\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 22:05:31.144409 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-94faf4a4aad38fb86162d25c57d5681e3f89b5073929530903b66db47c845f72-shm.mount: Deactivated successfully. Mar 17 22:05:31.146113 env[1205]: time="2025-03-17T22:05:31.146061444Z" level=error msg="encountered an error cleaning up failed sandbox \"94faf4a4aad38fb86162d25c57d5681e3f89b5073929530903b66db47c845f72\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 22:05:31.146330 env[1205]: time="2025-03-17T22:05:31.146272034Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-9cf959fb7-6grpc,Uid:58155caf-9ac0-4f91-81aa-f85d1f16be02,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"94faf4a4aad38fb86162d25c57d5681e3f89b5073929530903b66db47c845f72\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 22:05:31.146946 kubelet[2045]: E0317 22:05:31.146866 2045 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"94faf4a4aad38fb86162d25c57d5681e3f89b5073929530903b66db47c845f72\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 22:05:31.147138 kubelet[2045]: E0317 22:05:31.146989 2045 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"94faf4a4aad38fb86162d25c57d5681e3f89b5073929530903b66db47c845f72\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-9cf959fb7-6grpc" Mar 17 22:05:31.147138 kubelet[2045]: E0317 22:05:31.147027 2045 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"94faf4a4aad38fb86162d25c57d5681e3f89b5073929530903b66db47c845f72\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-9cf959fb7-6grpc" Mar 17 22:05:31.147277 kubelet[2045]: E0317 22:05:31.147109 2045 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-9cf959fb7-6grpc_calico-apiserver(58155caf-9ac0-4f91-81aa-f85d1f16be02)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-9cf959fb7-6grpc_calico-apiserver(58155caf-9ac0-4f91-81aa-f85d1f16be02)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"94faf4a4aad38fb86162d25c57d5681e3f89b5073929530903b66db47c845f72\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-9cf959fb7-6grpc" podUID="58155caf-9ac0-4f91-81aa-f85d1f16be02" Mar 17 22:05:31.151871 env[1205]: time="2025-03-17T22:05:31.151807600Z" level=error msg="Failed to destroy network for sandbox \"1a6e0fa047fd2311b532c4efbd12e41d6da3834f1825ac8355467466bd832654\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 22:05:31.152577 env[1205]: time="2025-03-17T22:05:31.152515167Z" level=error msg="encountered an error cleaning up failed sandbox \"1a6e0fa047fd2311b532c4efbd12e41d6da3834f1825ac8355467466bd832654\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 22:05:31.152801 env[1205]: time="2025-03-17T22:05:31.152733309Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-df4ccfbfc-h8m5j,Uid:62b3841b-0f84-466f-921a-c6f2f9062835,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"1a6e0fa047fd2311b532c4efbd12e41d6da3834f1825ac8355467466bd832654\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 22:05:31.153324 kubelet[2045]: E0317 22:05:31.153220 2045 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1a6e0fa047fd2311b532c4efbd12e41d6da3834f1825ac8355467466bd832654\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 22:05:31.153418 kubelet[2045]: E0317 22:05:31.153341 2045 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1a6e0fa047fd2311b532c4efbd12e41d6da3834f1825ac8355467466bd832654\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-df4ccfbfc-h8m5j" Mar 17 22:05:31.153418 kubelet[2045]: E0317 22:05:31.153392 2045 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1a6e0fa047fd2311b532c4efbd12e41d6da3834f1825ac8355467466bd832654\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-df4ccfbfc-h8m5j" Mar 17 22:05:31.154601 kubelet[2045]: E0317 22:05:31.153472 2045 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-df4ccfbfc-h8m5j_calico-system(62b3841b-0f84-466f-921a-c6f2f9062835)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-df4ccfbfc-h8m5j_calico-system(62b3841b-0f84-466f-921a-c6f2f9062835)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"1a6e0fa047fd2311b532c4efbd12e41d6da3834f1825ac8355467466bd832654\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-df4ccfbfc-h8m5j" podUID="62b3841b-0f84-466f-921a-c6f2f9062835" Mar 17 22:05:31.598957 systemd[1]: Created slice kubepods-besteffort-pod72a58b73_e5b8_4cf5_bcd4_e7ba6f464863.slice. Mar 17 22:05:31.602706 env[1205]: time="2025-03-17T22:05:31.602654068Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-8qsmb,Uid:72a58b73-e5b8-4cf5-bcd4-e7ba6f464863,Namespace:calico-system,Attempt:0,}" Mar 17 22:05:31.691689 env[1205]: time="2025-03-17T22:05:31.691597857Z" level=error msg="Failed to destroy network for sandbox \"7b7de6ee875cb03d8c5c06602b11497caeb90ad58224ff1037ca6ff34c3d6380\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 22:05:31.692266 env[1205]: time="2025-03-17T22:05:31.692209263Z" level=error msg="encountered an error cleaning up failed sandbox \"7b7de6ee875cb03d8c5c06602b11497caeb90ad58224ff1037ca6ff34c3d6380\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 22:05:31.692348 env[1205]: time="2025-03-17T22:05:31.692290866Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-8qsmb,Uid:72a58b73-e5b8-4cf5-bcd4-e7ba6f464863,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"7b7de6ee875cb03d8c5c06602b11497caeb90ad58224ff1037ca6ff34c3d6380\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 22:05:31.692742 kubelet[2045]: E0317 22:05:31.692683 2045 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7b7de6ee875cb03d8c5c06602b11497caeb90ad58224ff1037ca6ff34c3d6380\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 22:05:31.693376 kubelet[2045]: E0317 22:05:31.692772 2045 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7b7de6ee875cb03d8c5c06602b11497caeb90ad58224ff1037ca6ff34c3d6380\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-8qsmb" Mar 17 22:05:31.693376 kubelet[2045]: E0317 22:05:31.692807 2045 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7b7de6ee875cb03d8c5c06602b11497caeb90ad58224ff1037ca6ff34c3d6380\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-8qsmb" Mar 17 22:05:31.693376 kubelet[2045]: E0317 22:05:31.692863 2045 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-8qsmb_calico-system(72a58b73-e5b8-4cf5-bcd4-e7ba6f464863)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-8qsmb_calico-system(72a58b73-e5b8-4cf5-bcd4-e7ba6f464863)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"7b7de6ee875cb03d8c5c06602b11497caeb90ad58224ff1037ca6ff34c3d6380\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-8qsmb" podUID="72a58b73-e5b8-4cf5-bcd4-e7ba6f464863" Mar 17 22:05:31.759318 kubelet[2045]: I0317 22:05:31.759268 2045 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="86a1255a92a9fb66a96092bff74e8535b80b4ff61972ceec62ee6fd36ddf9498" Mar 17 22:05:31.761110 env[1205]: time="2025-03-17T22:05:31.761062999Z" level=info msg="StopPodSandbox for \"86a1255a92a9fb66a96092bff74e8535b80b4ff61972ceec62ee6fd36ddf9498\"" Mar 17 22:05:31.762750 kubelet[2045]: I0317 22:05:31.762674 2045 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="84663afd621e7b0c4c243d86e5ea066a007eb77478f0a01766ef588875860094" Mar 17 22:05:31.764631 env[1205]: time="2025-03-17T22:05:31.764576770Z" level=info msg="StopPodSandbox for \"84663afd621e7b0c4c243d86e5ea066a007eb77478f0a01766ef588875860094\"" Mar 17 22:05:31.767624 kubelet[2045]: I0317 22:05:31.767038 2045 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="7b7de6ee875cb03d8c5c06602b11497caeb90ad58224ff1037ca6ff34c3d6380" Mar 17 22:05:31.768055 env[1205]: time="2025-03-17T22:05:31.768003280Z" level=info msg="StopPodSandbox for \"7b7de6ee875cb03d8c5c06602b11497caeb90ad58224ff1037ca6ff34c3d6380\"" Mar 17 22:05:31.773052 kubelet[2045]: I0317 22:05:31.773012 2045 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="94faf4a4aad38fb86162d25c57d5681e3f89b5073929530903b66db47c845f72" Mar 17 22:05:31.774820 env[1205]: time="2025-03-17T22:05:31.774772067Z" level=info msg="StopPodSandbox for \"94faf4a4aad38fb86162d25c57d5681e3f89b5073929530903b66db47c845f72\"" Mar 17 22:05:31.780746 kubelet[2045]: I0317 22:05:31.780703 2045 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="cf4c0eaa1785fa59168f93484a1e2dd4677bccc48d9f9b0dc40a0c9b3798b080" Mar 17 22:05:31.784916 env[1205]: time="2025-03-17T22:05:31.784858008Z" level=info msg="StopPodSandbox for \"cf4c0eaa1785fa59168f93484a1e2dd4677bccc48d9f9b0dc40a0c9b3798b080\"" Mar 17 22:05:31.787575 kubelet[2045]: I0317 22:05:31.787337 2045 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="1a6e0fa047fd2311b532c4efbd12e41d6da3834f1825ac8355467466bd832654" Mar 17 22:05:31.790738 env[1205]: time="2025-03-17T22:05:31.790674258Z" level=info msg="StopPodSandbox for \"1a6e0fa047fd2311b532c4efbd12e41d6da3834f1825ac8355467466bd832654\"" Mar 17 22:05:31.904994 env[1205]: time="2025-03-17T22:05:31.904904611Z" level=error msg="StopPodSandbox for \"7b7de6ee875cb03d8c5c06602b11497caeb90ad58224ff1037ca6ff34c3d6380\" failed" error="failed to destroy network for sandbox \"7b7de6ee875cb03d8c5c06602b11497caeb90ad58224ff1037ca6ff34c3d6380\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 22:05:31.905385 kubelet[2045]: E0317 22:05:31.905307 2045 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"7b7de6ee875cb03d8c5c06602b11497caeb90ad58224ff1037ca6ff34c3d6380\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="7b7de6ee875cb03d8c5c06602b11497caeb90ad58224ff1037ca6ff34c3d6380" Mar 17 22:05:31.905589 kubelet[2045]: E0317 22:05:31.905441 2045 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"7b7de6ee875cb03d8c5c06602b11497caeb90ad58224ff1037ca6ff34c3d6380"} Mar 17 22:05:31.905713 kubelet[2045]: E0317 22:05:31.905613 2045 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"72a58b73-e5b8-4cf5-bcd4-e7ba6f464863\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7b7de6ee875cb03d8c5c06602b11497caeb90ad58224ff1037ca6ff34c3d6380\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Mar 17 22:05:31.905713 kubelet[2045]: E0317 22:05:31.905681 2045 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"72a58b73-e5b8-4cf5-bcd4-e7ba6f464863\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7b7de6ee875cb03d8c5c06602b11497caeb90ad58224ff1037ca6ff34c3d6380\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-8qsmb" podUID="72a58b73-e5b8-4cf5-bcd4-e7ba6f464863" Mar 17 22:05:31.914833 env[1205]: time="2025-03-17T22:05:31.914723518Z" level=error msg="StopPodSandbox for \"86a1255a92a9fb66a96092bff74e8535b80b4ff61972ceec62ee6fd36ddf9498\" failed" error="failed to destroy network for sandbox \"86a1255a92a9fb66a96092bff74e8535b80b4ff61972ceec62ee6fd36ddf9498\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 22:05:31.915235 kubelet[2045]: E0317 22:05:31.915150 2045 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"86a1255a92a9fb66a96092bff74e8535b80b4ff61972ceec62ee6fd36ddf9498\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="86a1255a92a9fb66a96092bff74e8535b80b4ff61972ceec62ee6fd36ddf9498" Mar 17 22:05:31.915350 kubelet[2045]: E0317 22:05:31.915253 2045 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"86a1255a92a9fb66a96092bff74e8535b80b4ff61972ceec62ee6fd36ddf9498"} Mar 17 22:05:31.915435 kubelet[2045]: E0317 22:05:31.915329 2045 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"a82f42e7-3e9b-43f9-92e0-df21d942a638\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"86a1255a92a9fb66a96092bff74e8535b80b4ff61972ceec62ee6fd36ddf9498\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Mar 17 22:05:31.915435 kubelet[2045]: E0317 22:05:31.915404 2045 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"a82f42e7-3e9b-43f9-92e0-df21d942a638\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"86a1255a92a9fb66a96092bff74e8535b80b4ff61972ceec62ee6fd36ddf9498\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-668d6bf9bc-hksfn" podUID="a82f42e7-3e9b-43f9-92e0-df21d942a638" Mar 17 22:05:31.929142 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-1a6e0fa047fd2311b532c4efbd12e41d6da3834f1825ac8355467466bd832654-shm.mount: Deactivated successfully. Mar 17 22:05:31.962744 env[1205]: time="2025-03-17T22:05:31.962664411Z" level=error msg="StopPodSandbox for \"1a6e0fa047fd2311b532c4efbd12e41d6da3834f1825ac8355467466bd832654\" failed" error="failed to destroy network for sandbox \"1a6e0fa047fd2311b532c4efbd12e41d6da3834f1825ac8355467466bd832654\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 22:05:31.963362 kubelet[2045]: E0317 22:05:31.963302 2045 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"1a6e0fa047fd2311b532c4efbd12e41d6da3834f1825ac8355467466bd832654\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="1a6e0fa047fd2311b532c4efbd12e41d6da3834f1825ac8355467466bd832654" Mar 17 22:05:31.963485 kubelet[2045]: E0317 22:05:31.963397 2045 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"1a6e0fa047fd2311b532c4efbd12e41d6da3834f1825ac8355467466bd832654"} Mar 17 22:05:31.963485 kubelet[2045]: E0317 22:05:31.963467 2045 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"62b3841b-0f84-466f-921a-c6f2f9062835\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1a6e0fa047fd2311b532c4efbd12e41d6da3834f1825ac8355467466bd832654\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Mar 17 22:05:31.963713 kubelet[2045]: E0317 22:05:31.963506 2045 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"62b3841b-0f84-466f-921a-c6f2f9062835\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1a6e0fa047fd2311b532c4efbd12e41d6da3834f1825ac8355467466bd832654\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-df4ccfbfc-h8m5j" podUID="62b3841b-0f84-466f-921a-c6f2f9062835" Mar 17 22:05:31.968484 env[1205]: time="2025-03-17T22:05:31.968411654Z" level=error msg="StopPodSandbox for \"84663afd621e7b0c4c243d86e5ea066a007eb77478f0a01766ef588875860094\" failed" error="failed to destroy network for sandbox \"84663afd621e7b0c4c243d86e5ea066a007eb77478f0a01766ef588875860094\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 22:05:31.968830 kubelet[2045]: E0317 22:05:31.968731 2045 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"84663afd621e7b0c4c243d86e5ea066a007eb77478f0a01766ef588875860094\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="84663afd621e7b0c4c243d86e5ea066a007eb77478f0a01766ef588875860094" Mar 17 22:05:31.968938 kubelet[2045]: E0317 22:05:31.968856 2045 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"84663afd621e7b0c4c243d86e5ea066a007eb77478f0a01766ef588875860094"} Mar 17 22:05:31.969004 kubelet[2045]: E0317 22:05:31.968939 2045 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"630555ef-bf08-4b1a-91a4-a1ce8eafa62c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"84663afd621e7b0c4c243d86e5ea066a007eb77478f0a01766ef588875860094\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Mar 17 22:05:31.969004 kubelet[2045]: E0317 22:05:31.968974 2045 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"630555ef-bf08-4b1a-91a4-a1ce8eafa62c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"84663afd621e7b0c4c243d86e5ea066a007eb77478f0a01766ef588875860094\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-668d6bf9bc-67bbv" podUID="630555ef-bf08-4b1a-91a4-a1ce8eafa62c" Mar 17 22:05:31.972594 env[1205]: time="2025-03-17T22:05:31.972494044Z" level=error msg="StopPodSandbox for \"94faf4a4aad38fb86162d25c57d5681e3f89b5073929530903b66db47c845f72\" failed" error="failed to destroy network for sandbox \"94faf4a4aad38fb86162d25c57d5681e3f89b5073929530903b66db47c845f72\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 22:05:31.972921 kubelet[2045]: E0317 22:05:31.972787 2045 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"94faf4a4aad38fb86162d25c57d5681e3f89b5073929530903b66db47c845f72\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="94faf4a4aad38fb86162d25c57d5681e3f89b5073929530903b66db47c845f72" Mar 17 22:05:31.973024 kubelet[2045]: E0317 22:05:31.972934 2045 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"94faf4a4aad38fb86162d25c57d5681e3f89b5073929530903b66db47c845f72"} Mar 17 22:05:31.973024 kubelet[2045]: E0317 22:05:31.973013 2045 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"58155caf-9ac0-4f91-81aa-f85d1f16be02\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"94faf4a4aad38fb86162d25c57d5681e3f89b5073929530903b66db47c845f72\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Mar 17 22:05:31.973214 kubelet[2045]: E0317 22:05:31.973068 2045 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"58155caf-9ac0-4f91-81aa-f85d1f16be02\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"94faf4a4aad38fb86162d25c57d5681e3f89b5073929530903b66db47c845f72\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-9cf959fb7-6grpc" podUID="58155caf-9ac0-4f91-81aa-f85d1f16be02" Mar 17 22:05:31.983723 env[1205]: time="2025-03-17T22:05:31.983638028Z" level=error msg="StopPodSandbox for \"cf4c0eaa1785fa59168f93484a1e2dd4677bccc48d9f9b0dc40a0c9b3798b080\" failed" error="failed to destroy network for sandbox \"cf4c0eaa1785fa59168f93484a1e2dd4677bccc48d9f9b0dc40a0c9b3798b080\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 22:05:31.984115 kubelet[2045]: E0317 22:05:31.984028 2045 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"cf4c0eaa1785fa59168f93484a1e2dd4677bccc48d9f9b0dc40a0c9b3798b080\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="cf4c0eaa1785fa59168f93484a1e2dd4677bccc48d9f9b0dc40a0c9b3798b080" Mar 17 22:05:31.984253 kubelet[2045]: E0317 22:05:31.984135 2045 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"cf4c0eaa1785fa59168f93484a1e2dd4677bccc48d9f9b0dc40a0c9b3798b080"} Mar 17 22:05:31.984401 kubelet[2045]: E0317 22:05:31.984216 2045 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"6c786678-3d62-47ad-93a5-369b9da92261\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"cf4c0eaa1785fa59168f93484a1e2dd4677bccc48d9f9b0dc40a0c9b3798b080\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Mar 17 22:05:31.984401 kubelet[2045]: E0317 22:05:31.984328 2045 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"6c786678-3d62-47ad-93a5-369b9da92261\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"cf4c0eaa1785fa59168f93484a1e2dd4677bccc48d9f9b0dc40a0c9b3798b080\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-9cf959fb7-wc2pd" podUID="6c786678-3d62-47ad-93a5-369b9da92261" Mar 17 22:05:33.684000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.244.26.146:22-143.110.184.217:41156 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:05:33.685867 systemd[1]: Started sshd@20-10.244.26.146:22-143.110.184.217:41156.service. Mar 17 22:05:33.689116 kernel: kauditd_printk_skb: 35 callbacks suppressed Mar 17 22:05:33.689246 kernel: audit: type=1130 audit(1742249133.684:1040): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.244.26.146:22-143.110.184.217:41156 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:05:34.463116 sshd[3079]: Invalid user apache from 143.110.184.217 port 41156 Mar 17 22:05:34.639885 sshd[3079]: pam_faillock(sshd:auth): User unknown Mar 17 22:05:34.641609 sshd[3079]: pam_unix(sshd:auth): check pass; user unknown Mar 17 22:05:34.641842 sshd[3079]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.110.184.217 Mar 17 22:05:34.645510 sshd[3079]: pam_faillock(sshd:auth): User unknown Mar 17 22:05:34.644000 audit[3079]: USER_AUTH pid=3079 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="apache" exe="/usr/sbin/sshd" hostname=143.110.184.217 addr=143.110.184.217 terminal=ssh res=failed' Mar 17 22:05:34.655797 kernel: audit: type=1100 audit(1742249134.644:1041): pid=3079 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="apache" exe="/usr/sbin/sshd" hostname=143.110.184.217 addr=143.110.184.217 terminal=ssh res=failed' Mar 17 22:05:36.231000 sshd[3079]: Failed password for invalid user apache from 143.110.184.217 port 41156 ssh2 Mar 17 22:05:37.050309 sshd[3079]: Connection closed by invalid user apache 143.110.184.217 port 41156 [preauth] Mar 17 22:05:37.052722 systemd[1]: sshd@20-10.244.26.146:22-143.110.184.217:41156.service: Deactivated successfully. Mar 17 22:05:37.066066 kernel: audit: type=1131 audit(1742249137.051:1042): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.244.26.146:22-143.110.184.217:41156 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:05:37.051000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.244.26.146:22-143.110.184.217:41156 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:05:41.849443 kernel: audit: type=1130 audit(1742249141.836:1043): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.244.26.146:22-36.134.96.76:60516 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:05:41.836000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.244.26.146:22-36.134.96.76:60516 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:05:41.836411 systemd[1]: Started sshd@21-10.244.26.146:22-36.134.96.76:60516.service. Mar 17 22:05:43.046247 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1395168084.mount: Deactivated successfully. Mar 17 22:05:43.102277 env[1205]: time="2025-03-17T22:05:43.102075404Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 22:05:43.106053 env[1205]: time="2025-03-17T22:05:43.106010309Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 22:05:43.116742 env[1205]: time="2025-03-17T22:05:43.116665716Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 22:05:43.119936 env[1205]: time="2025-03-17T22:05:43.119900394Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:99c3917516efe1f807a0cfdf2d14b628b7c5cc6bd8a9ee5a253154f31756bea1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 22:05:43.120694 env[1205]: time="2025-03-17T22:05:43.120651792Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\" returns image reference \"sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664\"" Mar 17 22:05:43.166333 env[1205]: time="2025-03-17T22:05:43.166263344Z" level=info msg="CreateContainer within sandbox \"aac25bb5e96819055c4887fb91cd1be38a154a25dca346a62f486d196cd98763\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Mar 17 22:05:43.191847 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3410036560.mount: Deactivated successfully. Mar 17 22:05:43.202318 env[1205]: time="2025-03-17T22:05:43.202240384Z" level=info msg="CreateContainer within sandbox \"aac25bb5e96819055c4887fb91cd1be38a154a25dca346a62f486d196cd98763\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"08c5c45eae9aba2a56359dea30e909a27076c5c8abf4308aaf72f714e90fc123\"" Mar 17 22:05:43.205852 env[1205]: time="2025-03-17T22:05:43.205786860Z" level=info msg="StartContainer for \"08c5c45eae9aba2a56359dea30e909a27076c5c8abf4308aaf72f714e90fc123\"" Mar 17 22:05:43.241231 systemd[1]: Started cri-containerd-08c5c45eae9aba2a56359dea30e909a27076c5c8abf4308aaf72f714e90fc123.scope. Mar 17 22:05:43.286000 audit[3096]: AVC avc: denied { perfmon } for pid=3096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:43.297631 kernel: audit: type=1400 audit(1742249143.286:1044): avc: denied { perfmon } for pid=3096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:43.286000 audit[3096]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f28d068a518 items=0 ppid=2505 pid=3096 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:43.312611 kernel: audit: type=1300 audit(1742249143.286:1044): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f28d068a518 items=0 ppid=2505 pid=3096 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:43.286000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038633563343565616539616261326135363335396465613330653930 Mar 17 22:05:43.323705 kernel: audit: type=1327 audit(1742249143.286:1044): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038633563343565616539616261326135363335396465613330653930 Mar 17 22:05:43.286000 audit[3096]: AVC avc: denied { bpf } for pid=3096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:43.337728 kernel: audit: type=1400 audit(1742249143.286:1045): avc: denied { bpf } for pid=3096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:43.286000 audit[3096]: AVC avc: denied { bpf } for pid=3096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:43.348341 kernel: audit: type=1400 audit(1742249143.286:1045): avc: denied { bpf } for pid=3096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:43.348464 kernel: audit: type=1400 audit(1742249143.286:1045): avc: denied { bpf } for pid=3096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:43.286000 audit[3096]: AVC avc: denied { bpf } for pid=3096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:43.286000 audit[3096]: AVC avc: denied { perfmon } for pid=3096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:43.359224 kernel: audit: type=1400 audit(1742249143.286:1045): avc: denied { perfmon } for pid=3096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:43.359347 kernel: audit: type=1400 audit(1742249143.286:1045): avc: denied { perfmon } for pid=3096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:43.286000 audit[3096]: AVC avc: denied { perfmon } for pid=3096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:43.286000 audit[3096]: AVC avc: denied { perfmon } for pid=3096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:43.286000 audit[3096]: AVC avc: denied { perfmon } for pid=3096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:43.286000 audit[3096]: AVC avc: denied { perfmon } for pid=3096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:43.286000 audit[3096]: AVC avc: denied { bpf } for pid=3096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:43.286000 audit[3096]: AVC avc: denied { bpf } for pid=3096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:43.286000 audit: BPF prog-id=136 op=LOAD Mar 17 22:05:43.365793 kernel: audit: type=1400 audit(1742249143.286:1045): avc: denied { perfmon } for pid=3096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:43.286000 audit[3096]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0002d9ba8 items=0 ppid=2505 pid=3096 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:43.286000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038633563343565616539616261326135363335396465613330653930 Mar 17 22:05:43.287000 audit[3096]: AVC avc: denied { bpf } for pid=3096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:43.287000 audit[3096]: AVC avc: denied { bpf } for pid=3096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:43.287000 audit[3096]: AVC avc: denied { perfmon } for pid=3096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:43.287000 audit[3096]: AVC avc: denied { perfmon } for pid=3096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:43.287000 audit[3096]: AVC avc: denied { perfmon } for pid=3096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:43.287000 audit[3096]: AVC avc: denied { perfmon } for pid=3096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:43.287000 audit[3096]: AVC avc: denied { perfmon } for pid=3096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:43.287000 audit[3096]: AVC avc: denied { bpf } for pid=3096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:43.287000 audit[3096]: AVC avc: denied { bpf } for pid=3096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:43.287000 audit: BPF prog-id=137 op=LOAD Mar 17 22:05:43.287000 audit[3096]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0002d9bf8 items=0 ppid=2505 pid=3096 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:43.287000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038633563343565616539616261326135363335396465613330653930 Mar 17 22:05:43.287000 audit: BPF prog-id=137 op=UNLOAD Mar 17 22:05:43.287000 audit: BPF prog-id=136 op=UNLOAD Mar 17 22:05:43.287000 audit[3096]: AVC avc: denied { bpf } for pid=3096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:43.287000 audit[3096]: AVC avc: denied { bpf } for pid=3096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:43.287000 audit[3096]: AVC avc: denied { bpf } for pid=3096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:43.287000 audit[3096]: AVC avc: denied { perfmon } for pid=3096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:43.287000 audit[3096]: AVC avc: denied { perfmon } for pid=3096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:43.287000 audit[3096]: AVC avc: denied { perfmon } for pid=3096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:43.287000 audit[3096]: AVC avc: denied { perfmon } for pid=3096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:43.287000 audit[3096]: AVC avc: denied { perfmon } for pid=3096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:43.287000 audit[3096]: AVC avc: denied { bpf } for pid=3096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:43.287000 audit[3096]: AVC avc: denied { bpf } for pid=3096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:43.287000 audit: BPF prog-id=138 op=LOAD Mar 17 22:05:43.287000 audit[3096]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0002d9c88 items=0 ppid=2505 pid=3096 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:43.287000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038633563343565616539616261326135363335396465613330653930 Mar 17 22:05:43.379419 env[1205]: time="2025-03-17T22:05:43.379334859Z" level=info msg="StartContainer for \"08c5c45eae9aba2a56359dea30e909a27076c5c8abf4308aaf72f714e90fc123\" returns successfully" Mar 17 22:05:43.659600 env[1205]: time="2025-03-17T22:05:43.657174762Z" level=info msg="StopPodSandbox for \"86a1255a92a9fb66a96092bff74e8535b80b4ff61972ceec62ee6fd36ddf9498\"" Mar 17 22:05:43.753892 env[1205]: time="2025-03-17T22:05:43.753772558Z" level=error msg="StopPodSandbox for \"86a1255a92a9fb66a96092bff74e8535b80b4ff61972ceec62ee6fd36ddf9498\" failed" error="failed to destroy network for sandbox \"86a1255a92a9fb66a96092bff74e8535b80b4ff61972ceec62ee6fd36ddf9498\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 22:05:43.787084 kubelet[2045]: E0317 22:05:43.786942 2045 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"86a1255a92a9fb66a96092bff74e8535b80b4ff61972ceec62ee6fd36ddf9498\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="86a1255a92a9fb66a96092bff74e8535b80b4ff61972ceec62ee6fd36ddf9498" Mar 17 22:05:43.788281 kubelet[2045]: E0317 22:05:43.787123 2045 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"86a1255a92a9fb66a96092bff74e8535b80b4ff61972ceec62ee6fd36ddf9498"} Mar 17 22:05:43.789628 kubelet[2045]: E0317 22:05:43.789507 2045 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"a82f42e7-3e9b-43f9-92e0-df21d942a638\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"86a1255a92a9fb66a96092bff74e8535b80b4ff61972ceec62ee6fd36ddf9498\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Mar 17 22:05:43.793010 kubelet[2045]: E0317 22:05:43.792928 2045 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"a82f42e7-3e9b-43f9-92e0-df21d942a638\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"86a1255a92a9fb66a96092bff74e8535b80b4ff61972ceec62ee6fd36ddf9498\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-668d6bf9bc-hksfn" podUID="a82f42e7-3e9b-43f9-92e0-df21d942a638" Mar 17 22:05:43.919037 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Mar 17 22:05:43.919307 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Mar 17 22:05:43.919454 kubelet[2045]: I0317 22:05:43.910705 2045 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-cw6hs" podStartSLOduration=2.979752985 podStartE2EDuration="30.906750323s" podCreationTimestamp="2025-03-17 22:05:13 +0000 UTC" firstStartedPulling="2025-03-17 22:05:15.195533643 +0000 UTC m=+14.871908149" lastFinishedPulling="2025-03-17 22:05:43.122530977 +0000 UTC m=+42.798905487" observedRunningTime="2025-03-17 22:05:43.896452006 +0000 UTC m=+43.572826523" watchObservedRunningTime="2025-03-17 22:05:43.906750323 +0000 UTC m=+43.583124839" Mar 17 22:05:44.128000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.244.26.146:22-143.110.184.217:46908 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:05:44.128952 systemd[1]: Started sshd@22-10.244.26.146:22-143.110.184.217:46908.service. Mar 17 22:05:44.594140 env[1205]: time="2025-03-17T22:05:44.593463845Z" level=info msg="StopPodSandbox for \"cf4c0eaa1785fa59168f93484a1e2dd4677bccc48d9f9b0dc40a0c9b3798b080\"" Mar 17 22:05:44.598056 env[1205]: time="2025-03-17T22:05:44.597778569Z" level=info msg="StopPodSandbox for \"7b7de6ee875cb03d8c5c06602b11497caeb90ad58224ff1037ca6ff34c3d6380\"" Mar 17 22:05:44.851942 sshd[3175]: Invalid user hikvision from 143.110.184.217 port 46908 Mar 17 22:05:44.914875 systemd[1]: run-containerd-runc-k8s.io-08c5c45eae9aba2a56359dea30e909a27076c5c8abf4308aaf72f714e90fc123-runc.vEuL2f.mount: Deactivated successfully. Mar 17 22:05:45.033133 sshd[3175]: pam_faillock(sshd:auth): User unknown Mar 17 22:05:45.034630 sshd[3175]: pam_unix(sshd:auth): check pass; user unknown Mar 17 22:05:45.034715 sshd[3175]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.110.184.217 Mar 17 22:05:45.035000 audit[3175]: USER_AUTH pid=3175 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="hikvision" exe="/usr/sbin/sshd" hostname=143.110.184.217 addr=143.110.184.217 terminal=ssh res=failed' Mar 17 22:05:45.036063 sshd[3175]: pam_faillock(sshd:auth): User unknown Mar 17 22:05:45.041487 env[1205]: 2025-03-17 22:05:44.753 [INFO][3208] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="cf4c0eaa1785fa59168f93484a1e2dd4677bccc48d9f9b0dc40a0c9b3798b080" Mar 17 22:05:45.041487 env[1205]: 2025-03-17 22:05:44.753 [INFO][3208] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="cf4c0eaa1785fa59168f93484a1e2dd4677bccc48d9f9b0dc40a0c9b3798b080" iface="eth0" netns="/var/run/netns/cni-0b970ce5-ba11-9089-6838-36bb68d903be" Mar 17 22:05:45.041487 env[1205]: 2025-03-17 22:05:44.753 [INFO][3208] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="cf4c0eaa1785fa59168f93484a1e2dd4677bccc48d9f9b0dc40a0c9b3798b080" iface="eth0" netns="/var/run/netns/cni-0b970ce5-ba11-9089-6838-36bb68d903be" Mar 17 22:05:45.041487 env[1205]: 2025-03-17 22:05:44.754 [INFO][3208] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="cf4c0eaa1785fa59168f93484a1e2dd4677bccc48d9f9b0dc40a0c9b3798b080" iface="eth0" netns="/var/run/netns/cni-0b970ce5-ba11-9089-6838-36bb68d903be" Mar 17 22:05:45.041487 env[1205]: 2025-03-17 22:05:44.754 [INFO][3208] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="cf4c0eaa1785fa59168f93484a1e2dd4677bccc48d9f9b0dc40a0c9b3798b080" Mar 17 22:05:45.041487 env[1205]: 2025-03-17 22:05:44.754 [INFO][3208] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="cf4c0eaa1785fa59168f93484a1e2dd4677bccc48d9f9b0dc40a0c9b3798b080" Mar 17 22:05:45.041487 env[1205]: 2025-03-17 22:05:45.011 [INFO][3236] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="cf4c0eaa1785fa59168f93484a1e2dd4677bccc48d9f9b0dc40a0c9b3798b080" HandleID="k8s-pod-network.cf4c0eaa1785fa59168f93484a1e2dd4677bccc48d9f9b0dc40a0c9b3798b080" Workload="srv--zbif7.gb1.brightbox.com-k8s-calico--apiserver--9cf959fb7--wc2pd-eth0" Mar 17 22:05:45.041487 env[1205]: 2025-03-17 22:05:45.014 [INFO][3236] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 22:05:45.041487 env[1205]: 2025-03-17 22:05:45.014 [INFO][3236] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 22:05:45.041487 env[1205]: 2025-03-17 22:05:45.029 [WARNING][3236] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="cf4c0eaa1785fa59168f93484a1e2dd4677bccc48d9f9b0dc40a0c9b3798b080" HandleID="k8s-pod-network.cf4c0eaa1785fa59168f93484a1e2dd4677bccc48d9f9b0dc40a0c9b3798b080" Workload="srv--zbif7.gb1.brightbox.com-k8s-calico--apiserver--9cf959fb7--wc2pd-eth0" Mar 17 22:05:45.041487 env[1205]: 2025-03-17 22:05:45.029 [INFO][3236] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="cf4c0eaa1785fa59168f93484a1e2dd4677bccc48d9f9b0dc40a0c9b3798b080" HandleID="k8s-pod-network.cf4c0eaa1785fa59168f93484a1e2dd4677bccc48d9f9b0dc40a0c9b3798b080" Workload="srv--zbif7.gb1.brightbox.com-k8s-calico--apiserver--9cf959fb7--wc2pd-eth0" Mar 17 22:05:45.041487 env[1205]: 2025-03-17 22:05:45.031 [INFO][3236] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 22:05:45.041487 env[1205]: 2025-03-17 22:05:45.039 [INFO][3208] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="cf4c0eaa1785fa59168f93484a1e2dd4677bccc48d9f9b0dc40a0c9b3798b080" Mar 17 22:05:45.049263 env[1205]: time="2025-03-17T22:05:45.045140026Z" level=info msg="TearDown network for sandbox \"cf4c0eaa1785fa59168f93484a1e2dd4677bccc48d9f9b0dc40a0c9b3798b080\" successfully" Mar 17 22:05:45.049263 env[1205]: time="2025-03-17T22:05:45.045204833Z" level=info msg="StopPodSandbox for \"cf4c0eaa1785fa59168f93484a1e2dd4677bccc48d9f9b0dc40a0c9b3798b080\" returns successfully" Mar 17 22:05:45.049263 env[1205]: time="2025-03-17T22:05:45.049150716Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-9cf959fb7-wc2pd,Uid:6c786678-3d62-47ad-93a5-369b9da92261,Namespace:calico-apiserver,Attempt:1,}" Mar 17 22:05:45.044912 systemd[1]: run-netns-cni\x2d0b970ce5\x2dba11\x2d9089\x2d6838\x2d36bb68d903be.mount: Deactivated successfully. Mar 17 22:05:45.070577 env[1205]: 2025-03-17 22:05:44.745 [INFO][3217] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="7b7de6ee875cb03d8c5c06602b11497caeb90ad58224ff1037ca6ff34c3d6380" Mar 17 22:05:45.070577 env[1205]: 2025-03-17 22:05:44.747 [INFO][3217] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="7b7de6ee875cb03d8c5c06602b11497caeb90ad58224ff1037ca6ff34c3d6380" iface="eth0" netns="/var/run/netns/cni-bf4e5cf8-406a-c50b-325b-96d3c08773fb" Mar 17 22:05:45.070577 env[1205]: 2025-03-17 22:05:44.747 [INFO][3217] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="7b7de6ee875cb03d8c5c06602b11497caeb90ad58224ff1037ca6ff34c3d6380" iface="eth0" netns="/var/run/netns/cni-bf4e5cf8-406a-c50b-325b-96d3c08773fb" Mar 17 22:05:45.070577 env[1205]: 2025-03-17 22:05:44.748 [INFO][3217] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="7b7de6ee875cb03d8c5c06602b11497caeb90ad58224ff1037ca6ff34c3d6380" iface="eth0" netns="/var/run/netns/cni-bf4e5cf8-406a-c50b-325b-96d3c08773fb" Mar 17 22:05:45.070577 env[1205]: 2025-03-17 22:05:44.749 [INFO][3217] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="7b7de6ee875cb03d8c5c06602b11497caeb90ad58224ff1037ca6ff34c3d6380" Mar 17 22:05:45.070577 env[1205]: 2025-03-17 22:05:44.749 [INFO][3217] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="7b7de6ee875cb03d8c5c06602b11497caeb90ad58224ff1037ca6ff34c3d6380" Mar 17 22:05:45.070577 env[1205]: 2025-03-17 22:05:45.011 [INFO][3235] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="7b7de6ee875cb03d8c5c06602b11497caeb90ad58224ff1037ca6ff34c3d6380" HandleID="k8s-pod-network.7b7de6ee875cb03d8c5c06602b11497caeb90ad58224ff1037ca6ff34c3d6380" Workload="srv--zbif7.gb1.brightbox.com-k8s-csi--node--driver--8qsmb-eth0" Mar 17 22:05:45.070577 env[1205]: 2025-03-17 22:05:45.014 [INFO][3235] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 22:05:45.070577 env[1205]: 2025-03-17 22:05:45.031 [INFO][3235] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 22:05:45.070577 env[1205]: 2025-03-17 22:05:45.057 [WARNING][3235] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="7b7de6ee875cb03d8c5c06602b11497caeb90ad58224ff1037ca6ff34c3d6380" HandleID="k8s-pod-network.7b7de6ee875cb03d8c5c06602b11497caeb90ad58224ff1037ca6ff34c3d6380" Workload="srv--zbif7.gb1.brightbox.com-k8s-csi--node--driver--8qsmb-eth0" Mar 17 22:05:45.070577 env[1205]: 2025-03-17 22:05:45.057 [INFO][3235] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="7b7de6ee875cb03d8c5c06602b11497caeb90ad58224ff1037ca6ff34c3d6380" HandleID="k8s-pod-network.7b7de6ee875cb03d8c5c06602b11497caeb90ad58224ff1037ca6ff34c3d6380" Workload="srv--zbif7.gb1.brightbox.com-k8s-csi--node--driver--8qsmb-eth0" Mar 17 22:05:45.070577 env[1205]: 2025-03-17 22:05:45.062 [INFO][3235] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 22:05:45.070577 env[1205]: 2025-03-17 22:05:45.067 [INFO][3217] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="7b7de6ee875cb03d8c5c06602b11497caeb90ad58224ff1037ca6ff34c3d6380" Mar 17 22:05:45.076275 env[1205]: time="2025-03-17T22:05:45.074342443Z" level=info msg="TearDown network for sandbox \"7b7de6ee875cb03d8c5c06602b11497caeb90ad58224ff1037ca6ff34c3d6380\" successfully" Mar 17 22:05:45.076275 env[1205]: time="2025-03-17T22:05:45.074423535Z" level=info msg="StopPodSandbox for \"7b7de6ee875cb03d8c5c06602b11497caeb90ad58224ff1037ca6ff34c3d6380\" returns successfully" Mar 17 22:05:45.076275 env[1205]: time="2025-03-17T22:05:45.075503290Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-8qsmb,Uid:72a58b73-e5b8-4cf5-bcd4-e7ba6f464863,Namespace:calico-system,Attempt:1,}" Mar 17 22:05:45.074702 systemd[1]: run-netns-cni\x2dbf4e5cf8\x2d406a\x2dc50b\x2d325b\x2d96d3c08773fb.mount: Deactivated successfully. Mar 17 22:05:45.409704 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Mar 17 22:05:45.410055 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): califfa9ffe3af9: link becomes ready Mar 17 22:05:45.415888 systemd-networkd[1031]: califfa9ffe3af9: Link UP Mar 17 22:05:45.416676 systemd-networkd[1031]: califfa9ffe3af9: Gained carrier Mar 17 22:05:45.464798 env[1205]: 2025-03-17 22:05:45.190 [INFO][3278] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist Mar 17 22:05:45.464798 env[1205]: 2025-03-17 22:05:45.213 [INFO][3278] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {srv--zbif7.gb1.brightbox.com-k8s-csi--node--driver--8qsmb-eth0 csi-node-driver- calico-system 72a58b73-e5b8-4cf5-bcd4-e7ba6f464863 784 0 2025-03-17 22:05:13 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:84cddb44f k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s srv-zbif7.gb1.brightbox.com csi-node-driver-8qsmb eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] califfa9ffe3af9 [] []}} ContainerID="0893610d76e3664367dde23252a185830b00cabcf4b587817760b37e2db5fc44" Namespace="calico-system" Pod="csi-node-driver-8qsmb" WorkloadEndpoint="srv--zbif7.gb1.brightbox.com-k8s-csi--node--driver--8qsmb-" Mar 17 22:05:45.464798 env[1205]: 2025-03-17 22:05:45.213 [INFO][3278] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="0893610d76e3664367dde23252a185830b00cabcf4b587817760b37e2db5fc44" Namespace="calico-system" Pod="csi-node-driver-8qsmb" WorkloadEndpoint="srv--zbif7.gb1.brightbox.com-k8s-csi--node--driver--8qsmb-eth0" Mar 17 22:05:45.464798 env[1205]: 2025-03-17 22:05:45.280 [INFO][3298] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="0893610d76e3664367dde23252a185830b00cabcf4b587817760b37e2db5fc44" HandleID="k8s-pod-network.0893610d76e3664367dde23252a185830b00cabcf4b587817760b37e2db5fc44" Workload="srv--zbif7.gb1.brightbox.com-k8s-csi--node--driver--8qsmb-eth0" Mar 17 22:05:45.464798 env[1205]: 2025-03-17 22:05:45.313 [INFO][3298] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="0893610d76e3664367dde23252a185830b00cabcf4b587817760b37e2db5fc44" HandleID="k8s-pod-network.0893610d76e3664367dde23252a185830b00cabcf4b587817760b37e2db5fc44" Workload="srv--zbif7.gb1.brightbox.com-k8s-csi--node--driver--8qsmb-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000292830), Attrs:map[string]string{"namespace":"calico-system", "node":"srv-zbif7.gb1.brightbox.com", "pod":"csi-node-driver-8qsmb", "timestamp":"2025-03-17 22:05:45.279954606 +0000 UTC"}, Hostname:"srv-zbif7.gb1.brightbox.com", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Mar 17 22:05:45.464798 env[1205]: 2025-03-17 22:05:45.314 [INFO][3298] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 22:05:45.464798 env[1205]: 2025-03-17 22:05:45.314 [INFO][3298] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 22:05:45.464798 env[1205]: 2025-03-17 22:05:45.314 [INFO][3298] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'srv-zbif7.gb1.brightbox.com' Mar 17 22:05:45.464798 env[1205]: 2025-03-17 22:05:45.321 [INFO][3298] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.0893610d76e3664367dde23252a185830b00cabcf4b587817760b37e2db5fc44" host="srv-zbif7.gb1.brightbox.com" Mar 17 22:05:45.464798 env[1205]: 2025-03-17 22:05:45.334 [INFO][3298] ipam/ipam.go 372: Looking up existing affinities for host host="srv-zbif7.gb1.brightbox.com" Mar 17 22:05:45.464798 env[1205]: 2025-03-17 22:05:45.345 [INFO][3298] ipam/ipam.go 489: Trying affinity for 192.168.17.64/26 host="srv-zbif7.gb1.brightbox.com" Mar 17 22:05:45.464798 env[1205]: 2025-03-17 22:05:45.350 [INFO][3298] ipam/ipam.go 155: Attempting to load block cidr=192.168.17.64/26 host="srv-zbif7.gb1.brightbox.com" Mar 17 22:05:45.464798 env[1205]: 2025-03-17 22:05:45.354 [INFO][3298] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.17.64/26 host="srv-zbif7.gb1.brightbox.com" Mar 17 22:05:45.464798 env[1205]: 2025-03-17 22:05:45.355 [INFO][3298] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.17.64/26 handle="k8s-pod-network.0893610d76e3664367dde23252a185830b00cabcf4b587817760b37e2db5fc44" host="srv-zbif7.gb1.brightbox.com" Mar 17 22:05:45.464798 env[1205]: 2025-03-17 22:05:45.358 [INFO][3298] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.0893610d76e3664367dde23252a185830b00cabcf4b587817760b37e2db5fc44 Mar 17 22:05:45.464798 env[1205]: 2025-03-17 22:05:45.367 [INFO][3298] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.17.64/26 handle="k8s-pod-network.0893610d76e3664367dde23252a185830b00cabcf4b587817760b37e2db5fc44" host="srv-zbif7.gb1.brightbox.com" Mar 17 22:05:45.464798 env[1205]: 2025-03-17 22:05:45.377 [INFO][3298] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.17.65/26] block=192.168.17.64/26 handle="k8s-pod-network.0893610d76e3664367dde23252a185830b00cabcf4b587817760b37e2db5fc44" host="srv-zbif7.gb1.brightbox.com" Mar 17 22:05:45.464798 env[1205]: 2025-03-17 22:05:45.377 [INFO][3298] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.17.65/26] handle="k8s-pod-network.0893610d76e3664367dde23252a185830b00cabcf4b587817760b37e2db5fc44" host="srv-zbif7.gb1.brightbox.com" Mar 17 22:05:45.464798 env[1205]: 2025-03-17 22:05:45.377 [INFO][3298] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 22:05:45.464798 env[1205]: 2025-03-17 22:05:45.377 [INFO][3298] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.17.65/26] IPv6=[] ContainerID="0893610d76e3664367dde23252a185830b00cabcf4b587817760b37e2db5fc44" HandleID="k8s-pod-network.0893610d76e3664367dde23252a185830b00cabcf4b587817760b37e2db5fc44" Workload="srv--zbif7.gb1.brightbox.com-k8s-csi--node--driver--8qsmb-eth0" Mar 17 22:05:45.468373 env[1205]: 2025-03-17 22:05:45.380 [INFO][3278] cni-plugin/k8s.go 386: Populated endpoint ContainerID="0893610d76e3664367dde23252a185830b00cabcf4b587817760b37e2db5fc44" Namespace="calico-system" Pod="csi-node-driver-8qsmb" WorkloadEndpoint="srv--zbif7.gb1.brightbox.com-k8s-csi--node--driver--8qsmb-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--zbif7.gb1.brightbox.com-k8s-csi--node--driver--8qsmb-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"72a58b73-e5b8-4cf5-bcd4-e7ba6f464863", ResourceVersion:"784", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 22, 5, 13, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"84cddb44f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-zbif7.gb1.brightbox.com", ContainerID:"", Pod:"csi-node-driver-8qsmb", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.17.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"califfa9ffe3af9", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 22:05:45.468373 env[1205]: 2025-03-17 22:05:45.380 [INFO][3278] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.17.65/32] ContainerID="0893610d76e3664367dde23252a185830b00cabcf4b587817760b37e2db5fc44" Namespace="calico-system" Pod="csi-node-driver-8qsmb" WorkloadEndpoint="srv--zbif7.gb1.brightbox.com-k8s-csi--node--driver--8qsmb-eth0" Mar 17 22:05:45.468373 env[1205]: 2025-03-17 22:05:45.380 [INFO][3278] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to califfa9ffe3af9 ContainerID="0893610d76e3664367dde23252a185830b00cabcf4b587817760b37e2db5fc44" Namespace="calico-system" Pod="csi-node-driver-8qsmb" WorkloadEndpoint="srv--zbif7.gb1.brightbox.com-k8s-csi--node--driver--8qsmb-eth0" Mar 17 22:05:45.468373 env[1205]: 2025-03-17 22:05:45.417 [INFO][3278] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="0893610d76e3664367dde23252a185830b00cabcf4b587817760b37e2db5fc44" Namespace="calico-system" Pod="csi-node-driver-8qsmb" WorkloadEndpoint="srv--zbif7.gb1.brightbox.com-k8s-csi--node--driver--8qsmb-eth0" Mar 17 22:05:45.468373 env[1205]: 2025-03-17 22:05:45.419 [INFO][3278] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="0893610d76e3664367dde23252a185830b00cabcf4b587817760b37e2db5fc44" Namespace="calico-system" Pod="csi-node-driver-8qsmb" WorkloadEndpoint="srv--zbif7.gb1.brightbox.com-k8s-csi--node--driver--8qsmb-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--zbif7.gb1.brightbox.com-k8s-csi--node--driver--8qsmb-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"72a58b73-e5b8-4cf5-bcd4-e7ba6f464863", ResourceVersion:"784", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 22, 5, 13, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"84cddb44f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-zbif7.gb1.brightbox.com", ContainerID:"0893610d76e3664367dde23252a185830b00cabcf4b587817760b37e2db5fc44", Pod:"csi-node-driver-8qsmb", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.17.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"califfa9ffe3af9", MAC:"8e:e0:f4:88:5e:b3", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 22:05:45.468373 env[1205]: 2025-03-17 22:05:45.461 [INFO][3278] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="0893610d76e3664367dde23252a185830b00cabcf4b587817760b37e2db5fc44" Namespace="calico-system" Pod="csi-node-driver-8qsmb" WorkloadEndpoint="srv--zbif7.gb1.brightbox.com-k8s-csi--node--driver--8qsmb-eth0" Mar 17 22:05:45.513142 env[1205]: time="2025-03-17T22:05:45.512931176Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Mar 17 22:05:45.513142 env[1205]: time="2025-03-17T22:05:45.513030673Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Mar 17 22:05:45.515906 env[1205]: time="2025-03-17T22:05:45.515654320Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Mar 17 22:05:45.518582 env[1205]: time="2025-03-17T22:05:45.516323648Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0893610d76e3664367dde23252a185830b00cabcf4b587817760b37e2db5fc44 pid=3327 runtime=io.containerd.runc.v2 Mar 17 22:05:45.538797 systemd-networkd[1031]: cali7dbd006b3e8: Link UP Mar 17 22:05:45.542275 systemd-networkd[1031]: cali7dbd006b3e8: Gained carrier Mar 17 22:05:45.544774 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali7dbd006b3e8: link becomes ready Mar 17 22:05:45.568874 systemd[1]: Started cri-containerd-0893610d76e3664367dde23252a185830b00cabcf4b587817760b37e2db5fc44.scope. Mar 17 22:05:45.584397 env[1205]: 2025-03-17 22:05:45.156 [INFO][3269] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist Mar 17 22:05:45.584397 env[1205]: 2025-03-17 22:05:45.181 [INFO][3269] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {srv--zbif7.gb1.brightbox.com-k8s-calico--apiserver--9cf959fb7--wc2pd-eth0 calico-apiserver-9cf959fb7- calico-apiserver 6c786678-3d62-47ad-93a5-369b9da92261 785 0 2025-03-17 22:05:13 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:9cf959fb7 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s srv-zbif7.gb1.brightbox.com calico-apiserver-9cf959fb7-wc2pd eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali7dbd006b3e8 [] []}} ContainerID="c2e60aeef56d051dd5d8df49f29315b96f7b595d0a0efd6487fb1f7452307136" Namespace="calico-apiserver" Pod="calico-apiserver-9cf959fb7-wc2pd" WorkloadEndpoint="srv--zbif7.gb1.brightbox.com-k8s-calico--apiserver--9cf959fb7--wc2pd-" Mar 17 22:05:45.584397 env[1205]: 2025-03-17 22:05:45.181 [INFO][3269] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="c2e60aeef56d051dd5d8df49f29315b96f7b595d0a0efd6487fb1f7452307136" Namespace="calico-apiserver" Pod="calico-apiserver-9cf959fb7-wc2pd" WorkloadEndpoint="srv--zbif7.gb1.brightbox.com-k8s-calico--apiserver--9cf959fb7--wc2pd-eth0" Mar 17 22:05:45.584397 env[1205]: 2025-03-17 22:05:45.295 [INFO][3293] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="c2e60aeef56d051dd5d8df49f29315b96f7b595d0a0efd6487fb1f7452307136" HandleID="k8s-pod-network.c2e60aeef56d051dd5d8df49f29315b96f7b595d0a0efd6487fb1f7452307136" Workload="srv--zbif7.gb1.brightbox.com-k8s-calico--apiserver--9cf959fb7--wc2pd-eth0" Mar 17 22:05:45.584397 env[1205]: 2025-03-17 22:05:45.316 [INFO][3293] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="c2e60aeef56d051dd5d8df49f29315b96f7b595d0a0efd6487fb1f7452307136" HandleID="k8s-pod-network.c2e60aeef56d051dd5d8df49f29315b96f7b595d0a0efd6487fb1f7452307136" Workload="srv--zbif7.gb1.brightbox.com-k8s-calico--apiserver--9cf959fb7--wc2pd-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00029e7f0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"srv-zbif7.gb1.brightbox.com", "pod":"calico-apiserver-9cf959fb7-wc2pd", "timestamp":"2025-03-17 22:05:45.295836529 +0000 UTC"}, Hostname:"srv-zbif7.gb1.brightbox.com", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Mar 17 22:05:45.584397 env[1205]: 2025-03-17 22:05:45.318 [INFO][3293] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 22:05:45.584397 env[1205]: 2025-03-17 22:05:45.377 [INFO][3293] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 22:05:45.584397 env[1205]: 2025-03-17 22:05:45.378 [INFO][3293] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'srv-zbif7.gb1.brightbox.com' Mar 17 22:05:45.584397 env[1205]: 2025-03-17 22:05:45.434 [INFO][3293] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.c2e60aeef56d051dd5d8df49f29315b96f7b595d0a0efd6487fb1f7452307136" host="srv-zbif7.gb1.brightbox.com" Mar 17 22:05:45.584397 env[1205]: 2025-03-17 22:05:45.465 [INFO][3293] ipam/ipam.go 372: Looking up existing affinities for host host="srv-zbif7.gb1.brightbox.com" Mar 17 22:05:45.584397 env[1205]: 2025-03-17 22:05:45.483 [INFO][3293] ipam/ipam.go 489: Trying affinity for 192.168.17.64/26 host="srv-zbif7.gb1.brightbox.com" Mar 17 22:05:45.584397 env[1205]: 2025-03-17 22:05:45.487 [INFO][3293] ipam/ipam.go 155: Attempting to load block cidr=192.168.17.64/26 host="srv-zbif7.gb1.brightbox.com" Mar 17 22:05:45.584397 env[1205]: 2025-03-17 22:05:45.492 [INFO][3293] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.17.64/26 host="srv-zbif7.gb1.brightbox.com" Mar 17 22:05:45.584397 env[1205]: 2025-03-17 22:05:45.492 [INFO][3293] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.17.64/26 handle="k8s-pod-network.c2e60aeef56d051dd5d8df49f29315b96f7b595d0a0efd6487fb1f7452307136" host="srv-zbif7.gb1.brightbox.com" Mar 17 22:05:45.584397 env[1205]: 2025-03-17 22:05:45.497 [INFO][3293] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.c2e60aeef56d051dd5d8df49f29315b96f7b595d0a0efd6487fb1f7452307136 Mar 17 22:05:45.584397 env[1205]: 2025-03-17 22:05:45.505 [INFO][3293] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.17.64/26 handle="k8s-pod-network.c2e60aeef56d051dd5d8df49f29315b96f7b595d0a0efd6487fb1f7452307136" host="srv-zbif7.gb1.brightbox.com" Mar 17 22:05:45.584397 env[1205]: 2025-03-17 22:05:45.519 [INFO][3293] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.17.66/26] block=192.168.17.64/26 handle="k8s-pod-network.c2e60aeef56d051dd5d8df49f29315b96f7b595d0a0efd6487fb1f7452307136" host="srv-zbif7.gb1.brightbox.com" Mar 17 22:05:45.584397 env[1205]: 2025-03-17 22:05:45.519 [INFO][3293] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.17.66/26] handle="k8s-pod-network.c2e60aeef56d051dd5d8df49f29315b96f7b595d0a0efd6487fb1f7452307136" host="srv-zbif7.gb1.brightbox.com" Mar 17 22:05:45.584397 env[1205]: 2025-03-17 22:05:45.519 [INFO][3293] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 22:05:45.584397 env[1205]: 2025-03-17 22:05:45.519 [INFO][3293] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.17.66/26] IPv6=[] ContainerID="c2e60aeef56d051dd5d8df49f29315b96f7b595d0a0efd6487fb1f7452307136" HandleID="k8s-pod-network.c2e60aeef56d051dd5d8df49f29315b96f7b595d0a0efd6487fb1f7452307136" Workload="srv--zbif7.gb1.brightbox.com-k8s-calico--apiserver--9cf959fb7--wc2pd-eth0" Mar 17 22:05:45.586193 env[1205]: 2025-03-17 22:05:45.523 [INFO][3269] cni-plugin/k8s.go 386: Populated endpoint ContainerID="c2e60aeef56d051dd5d8df49f29315b96f7b595d0a0efd6487fb1f7452307136" Namespace="calico-apiserver" Pod="calico-apiserver-9cf959fb7-wc2pd" WorkloadEndpoint="srv--zbif7.gb1.brightbox.com-k8s-calico--apiserver--9cf959fb7--wc2pd-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--zbif7.gb1.brightbox.com-k8s-calico--apiserver--9cf959fb7--wc2pd-eth0", GenerateName:"calico-apiserver-9cf959fb7-", Namespace:"calico-apiserver", SelfLink:"", UID:"6c786678-3d62-47ad-93a5-369b9da92261", ResourceVersion:"785", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 22, 5, 13, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"9cf959fb7", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-zbif7.gb1.brightbox.com", ContainerID:"", Pod:"calico-apiserver-9cf959fb7-wc2pd", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.17.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali7dbd006b3e8", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 22:05:45.586193 env[1205]: 2025-03-17 22:05:45.523 [INFO][3269] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.17.66/32] ContainerID="c2e60aeef56d051dd5d8df49f29315b96f7b595d0a0efd6487fb1f7452307136" Namespace="calico-apiserver" Pod="calico-apiserver-9cf959fb7-wc2pd" WorkloadEndpoint="srv--zbif7.gb1.brightbox.com-k8s-calico--apiserver--9cf959fb7--wc2pd-eth0" Mar 17 22:05:45.586193 env[1205]: 2025-03-17 22:05:45.523 [INFO][3269] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali7dbd006b3e8 ContainerID="c2e60aeef56d051dd5d8df49f29315b96f7b595d0a0efd6487fb1f7452307136" Namespace="calico-apiserver" Pod="calico-apiserver-9cf959fb7-wc2pd" WorkloadEndpoint="srv--zbif7.gb1.brightbox.com-k8s-calico--apiserver--9cf959fb7--wc2pd-eth0" Mar 17 22:05:45.586193 env[1205]: 2025-03-17 22:05:45.545 [INFO][3269] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="c2e60aeef56d051dd5d8df49f29315b96f7b595d0a0efd6487fb1f7452307136" Namespace="calico-apiserver" Pod="calico-apiserver-9cf959fb7-wc2pd" WorkloadEndpoint="srv--zbif7.gb1.brightbox.com-k8s-calico--apiserver--9cf959fb7--wc2pd-eth0" Mar 17 22:05:45.586193 env[1205]: 2025-03-17 22:05:45.545 [INFO][3269] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="c2e60aeef56d051dd5d8df49f29315b96f7b595d0a0efd6487fb1f7452307136" Namespace="calico-apiserver" Pod="calico-apiserver-9cf959fb7-wc2pd" WorkloadEndpoint="srv--zbif7.gb1.brightbox.com-k8s-calico--apiserver--9cf959fb7--wc2pd-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--zbif7.gb1.brightbox.com-k8s-calico--apiserver--9cf959fb7--wc2pd-eth0", GenerateName:"calico-apiserver-9cf959fb7-", Namespace:"calico-apiserver", SelfLink:"", UID:"6c786678-3d62-47ad-93a5-369b9da92261", ResourceVersion:"785", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 22, 5, 13, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"9cf959fb7", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-zbif7.gb1.brightbox.com", ContainerID:"c2e60aeef56d051dd5d8df49f29315b96f7b595d0a0efd6487fb1f7452307136", Pod:"calico-apiserver-9cf959fb7-wc2pd", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.17.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali7dbd006b3e8", MAC:"7e:b8:ea:20:31:26", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 22:05:45.586193 env[1205]: 2025-03-17 22:05:45.577 [INFO][3269] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="c2e60aeef56d051dd5d8df49f29315b96f7b595d0a0efd6487fb1f7452307136" Namespace="calico-apiserver" Pod="calico-apiserver-9cf959fb7-wc2pd" WorkloadEndpoint="srv--zbif7.gb1.brightbox.com-k8s-calico--apiserver--9cf959fb7--wc2pd-eth0" Mar 17 22:05:45.595757 env[1205]: time="2025-03-17T22:05:45.593163685Z" level=info msg="StopPodSandbox for \"94faf4a4aad38fb86162d25c57d5681e3f89b5073929530903b66db47c845f72\"" Mar 17 22:05:45.595757 env[1205]: time="2025-03-17T22:05:45.593962407Z" level=info msg="StopPodSandbox for \"1a6e0fa047fd2311b532c4efbd12e41d6da3834f1825ac8355467466bd832654\"" Mar 17 22:05:45.665000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:45.665000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:45.665000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:45.665000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:45.665000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:45.665000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:45.665000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:45.665000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:45.665000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:45.666000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:45.666000 audit: BPF prog-id=139 op=LOAD Mar 17 22:05:45.670000 audit[3336]: AVC avc: denied { bpf } for pid=3336 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:45.670000 audit[3336]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3327 pid=3336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:45.670000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038393336313064373665333636343336376464653233323532613138 Mar 17 22:05:45.670000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:45.670000 audit[3336]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3327 pid=3336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:45.670000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038393336313064373665333636343336376464653233323532613138 Mar 17 22:05:45.670000 audit[3336]: AVC avc: denied { bpf } for pid=3336 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:45.670000 audit[3336]: AVC avc: denied { bpf } for pid=3336 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:45.670000 audit[3336]: AVC avc: denied { bpf } for pid=3336 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:45.670000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:45.670000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:45.670000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:45.670000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:45.670000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:45.670000 audit[3336]: AVC avc: denied { bpf } for pid=3336 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:45.670000 audit[3336]: AVC avc: denied { bpf } for pid=3336 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:45.670000 audit: BPF prog-id=140 op=LOAD Mar 17 22:05:45.670000 audit[3336]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001c6830 items=0 ppid=3327 pid=3336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:45.670000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038393336313064373665333636343336376464653233323532613138 Mar 17 22:05:45.671000 audit[3336]: AVC avc: denied { bpf } for pid=3336 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:45.671000 audit[3336]: AVC avc: denied { bpf } for pid=3336 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:45.671000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:45.671000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:45.671000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:45.671000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:45.671000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:45.671000 audit[3336]: AVC avc: denied { bpf } for pid=3336 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:45.671000 audit[3336]: AVC avc: denied { bpf } for pid=3336 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:45.671000 audit: BPF prog-id=141 op=LOAD Mar 17 22:05:45.671000 audit[3336]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001c6878 items=0 ppid=3327 pid=3336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:45.671000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038393336313064373665333636343336376464653233323532613138 Mar 17 22:05:45.671000 audit: BPF prog-id=141 op=UNLOAD Mar 17 22:05:45.671000 audit: BPF prog-id=140 op=UNLOAD Mar 17 22:05:45.671000 audit[3336]: AVC avc: denied { bpf } for pid=3336 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:45.671000 audit[3336]: AVC avc: denied { bpf } for pid=3336 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:45.671000 audit[3336]: AVC avc: denied { bpf } for pid=3336 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:45.671000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:45.671000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:45.671000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:45.671000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:45.671000 audit[3336]: AVC avc: denied { perfmon } for pid=3336 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:45.671000 audit[3336]: AVC avc: denied { bpf } for pid=3336 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:45.671000 audit[3336]: AVC avc: denied { bpf } for pid=3336 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:45.671000 audit: BPF prog-id=142 op=LOAD Mar 17 22:05:45.671000 audit[3336]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001c6c88 items=0 ppid=3327 pid=3336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:45.671000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038393336313064373665333636343336376464653233323532613138 Mar 17 22:05:45.675738 env[1205]: time="2025-03-17T22:05:45.664023663Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Mar 17 22:05:45.675738 env[1205]: time="2025-03-17T22:05:45.664143236Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Mar 17 22:05:45.675738 env[1205]: time="2025-03-17T22:05:45.664204755Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Mar 17 22:05:45.675738 env[1205]: time="2025-03-17T22:05:45.667200414Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c2e60aeef56d051dd5d8df49f29315b96f7b595d0a0efd6487fb1f7452307136 pid=3388 runtime=io.containerd.runc.v2 Mar 17 22:05:45.703616 systemd[1]: Started cri-containerd-c2e60aeef56d051dd5d8df49f29315b96f7b595d0a0efd6487fb1f7452307136.scope. Mar 17 22:05:45.774476 env[1205]: time="2025-03-17T22:05:45.774382308Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-8qsmb,Uid:72a58b73-e5b8-4cf5-bcd4-e7ba6f464863,Namespace:calico-system,Attempt:1,} returns sandbox id \"0893610d76e3664367dde23252a185830b00cabcf4b587817760b37e2db5fc44\"" Mar 17 22:05:45.782591 env[1205]: time="2025-03-17T22:05:45.781871297Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\"" Mar 17 22:05:45.821000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:45.821000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:45.821000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:45.821000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:45.821000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:45.821000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:45.821000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:45.821000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:45.821000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:45.822000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:45.822000 audit: BPF prog-id=143 op=LOAD Mar 17 22:05:45.825000 audit[3413]: AVC avc: denied { bpf } for pid=3413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:45.825000 audit[3413]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=3388 pid=3413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:45.825000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332653630616565663536643035316464356438646634396632393331 Mar 17 22:05:45.825000 audit[3413]: AVC avc: denied { perfmon } for pid=3413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:45.825000 audit[3413]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=3388 pid=3413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:45.825000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332653630616565663536643035316464356438646634396632393331 Mar 17 22:05:45.825000 audit[3413]: AVC avc: denied { bpf } for pid=3413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:45.825000 audit[3413]: AVC avc: denied { bpf } for pid=3413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:45.825000 audit[3413]: AVC avc: denied { bpf } for pid=3413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:45.825000 audit[3413]: AVC avc: denied { perfmon } for pid=3413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:45.825000 audit[3413]: AVC avc: denied { perfmon } for pid=3413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:45.825000 audit[3413]: AVC avc: denied { perfmon } for pid=3413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:45.825000 audit[3413]: AVC avc: denied { perfmon } for pid=3413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:45.825000 audit[3413]: AVC avc: denied { perfmon } for pid=3413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:45.825000 audit[3413]: AVC avc: denied { bpf } for pid=3413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:45.825000 audit[3413]: AVC avc: denied { bpf } for pid=3413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:45.825000 audit: BPF prog-id=144 op=LOAD Mar 17 22:05:45.825000 audit[3413]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0003485a0 items=0 ppid=3388 pid=3413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:45.825000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332653630616565663536643035316464356438646634396632393331 Mar 17 22:05:45.825000 audit[3413]: AVC avc: denied { bpf } for pid=3413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:45.825000 audit[3413]: AVC avc: denied { bpf } for pid=3413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:45.825000 audit[3413]: AVC avc: denied { perfmon } for pid=3413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:45.825000 audit[3413]: AVC avc: denied { perfmon } for pid=3413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:45.825000 audit[3413]: AVC avc: denied { perfmon } for pid=3413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:45.825000 audit[3413]: AVC avc: denied { perfmon } for pid=3413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:45.825000 audit[3413]: AVC avc: denied { perfmon } for pid=3413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:45.825000 audit[3413]: AVC avc: denied { bpf } for pid=3413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:45.825000 audit[3413]: AVC avc: denied { bpf } for pid=3413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:45.825000 audit: BPF prog-id=145 op=LOAD Mar 17 22:05:45.825000 audit[3413]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0003485e8 items=0 ppid=3388 pid=3413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:45.825000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332653630616565663536643035316464356438646634396632393331 Mar 17 22:05:45.825000 audit: BPF prog-id=145 op=UNLOAD Mar 17 22:05:45.825000 audit: BPF prog-id=144 op=UNLOAD Mar 17 22:05:45.826000 audit[3413]: AVC avc: denied { bpf } for pid=3413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:45.826000 audit[3413]: AVC avc: denied { bpf } for pid=3413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:45.826000 audit[3413]: AVC avc: denied { bpf } for pid=3413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:45.826000 audit[3413]: AVC avc: denied { perfmon } for pid=3413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:45.826000 audit[3413]: AVC avc: denied { perfmon } for pid=3413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:45.826000 audit[3413]: AVC avc: denied { perfmon } for pid=3413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:45.826000 audit[3413]: AVC avc: denied { perfmon } for pid=3413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:45.826000 audit[3413]: AVC avc: denied { perfmon } for pid=3413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:45.826000 audit[3413]: AVC avc: denied { bpf } for pid=3413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:45.826000 audit[3413]: AVC avc: denied { bpf } for pid=3413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:45.826000 audit: BPF prog-id=146 op=LOAD Mar 17 22:05:45.826000 audit[3413]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0003489f8 items=0 ppid=3388 pid=3413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:45.826000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332653630616565663536643035316464356438646634396632393331 Mar 17 22:05:45.972000 audit[3497]: AVC avc: denied { write } for pid=3497 comm="tee" name="fd" dev="proc" ino=30849 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Mar 17 22:05:45.972000 audit[3497]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffea0621a06 a2=241 a3=1b6 items=1 ppid=3449 pid=3497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:45.972000 audit: CWD cwd="/etc/service/enabled/felix/log" Mar 17 22:05:45.972000 audit: PATH item=0 name="/dev/fd/63" inode=30846 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 22:05:45.972000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Mar 17 22:05:46.053715 env[1205]: 2025-03-17 22:05:45.898 [INFO][3402] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="1a6e0fa047fd2311b532c4efbd12e41d6da3834f1825ac8355467466bd832654" Mar 17 22:05:46.053715 env[1205]: 2025-03-17 22:05:45.899 [INFO][3402] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="1a6e0fa047fd2311b532c4efbd12e41d6da3834f1825ac8355467466bd832654" iface="eth0" netns="/var/run/netns/cni-a9ca99a7-6b68-903a-b3c3-c08943175b0a" Mar 17 22:05:46.053715 env[1205]: 2025-03-17 22:05:45.899 [INFO][3402] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="1a6e0fa047fd2311b532c4efbd12e41d6da3834f1825ac8355467466bd832654" iface="eth0" netns="/var/run/netns/cni-a9ca99a7-6b68-903a-b3c3-c08943175b0a" Mar 17 22:05:46.053715 env[1205]: 2025-03-17 22:05:45.899 [INFO][3402] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="1a6e0fa047fd2311b532c4efbd12e41d6da3834f1825ac8355467466bd832654" iface="eth0" netns="/var/run/netns/cni-a9ca99a7-6b68-903a-b3c3-c08943175b0a" Mar 17 22:05:46.053715 env[1205]: 2025-03-17 22:05:45.899 [INFO][3402] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="1a6e0fa047fd2311b532c4efbd12e41d6da3834f1825ac8355467466bd832654" Mar 17 22:05:46.053715 env[1205]: 2025-03-17 22:05:45.899 [INFO][3402] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1a6e0fa047fd2311b532c4efbd12e41d6da3834f1825ac8355467466bd832654" Mar 17 22:05:46.053715 env[1205]: 2025-03-17 22:05:46.027 [INFO][3481] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="1a6e0fa047fd2311b532c4efbd12e41d6da3834f1825ac8355467466bd832654" HandleID="k8s-pod-network.1a6e0fa047fd2311b532c4efbd12e41d6da3834f1825ac8355467466bd832654" Workload="srv--zbif7.gb1.brightbox.com-k8s-calico--kube--controllers--df4ccfbfc--h8m5j-eth0" Mar 17 22:05:46.053715 env[1205]: 2025-03-17 22:05:46.027 [INFO][3481] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 22:05:46.053715 env[1205]: 2025-03-17 22:05:46.027 [INFO][3481] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 22:05:46.053715 env[1205]: 2025-03-17 22:05:46.044 [WARNING][3481] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="1a6e0fa047fd2311b532c4efbd12e41d6da3834f1825ac8355467466bd832654" HandleID="k8s-pod-network.1a6e0fa047fd2311b532c4efbd12e41d6da3834f1825ac8355467466bd832654" Workload="srv--zbif7.gb1.brightbox.com-k8s-calico--kube--controllers--df4ccfbfc--h8m5j-eth0" Mar 17 22:05:46.053715 env[1205]: 2025-03-17 22:05:46.044 [INFO][3481] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="1a6e0fa047fd2311b532c4efbd12e41d6da3834f1825ac8355467466bd832654" HandleID="k8s-pod-network.1a6e0fa047fd2311b532c4efbd12e41d6da3834f1825ac8355467466bd832654" Workload="srv--zbif7.gb1.brightbox.com-k8s-calico--kube--controllers--df4ccfbfc--h8m5j-eth0" Mar 17 22:05:46.053715 env[1205]: 2025-03-17 22:05:46.047 [INFO][3481] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 22:05:46.053715 env[1205]: 2025-03-17 22:05:46.049 [INFO][3402] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="1a6e0fa047fd2311b532c4efbd12e41d6da3834f1825ac8355467466bd832654" Mar 17 22:05:46.054930 env[1205]: time="2025-03-17T22:05:46.054020670Z" level=info msg="TearDown network for sandbox \"1a6e0fa047fd2311b532c4efbd12e41d6da3834f1825ac8355467466bd832654\" successfully" Mar 17 22:05:46.054930 env[1205]: time="2025-03-17T22:05:46.054094157Z" level=info msg="StopPodSandbox for \"1a6e0fa047fd2311b532c4efbd12e41d6da3834f1825ac8355467466bd832654\" returns successfully" Mar 17 22:05:46.056217 env[1205]: time="2025-03-17T22:05:46.056178659Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-df4ccfbfc-h8m5j,Uid:62b3841b-0f84-466f-921a-c6f2f9062835,Namespace:calico-system,Attempt:1,}" Mar 17 22:05:46.076983 systemd[1]: run-netns-cni\x2da9ca99a7\x2d6b68\x2d903a\x2db3c3\x2dc08943175b0a.mount: Deactivated successfully. Mar 17 22:05:46.151666 env[1205]: 2025-03-17 22:05:45.936 [INFO][3403] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="94faf4a4aad38fb86162d25c57d5681e3f89b5073929530903b66db47c845f72" Mar 17 22:05:46.151666 env[1205]: 2025-03-17 22:05:45.937 [INFO][3403] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="94faf4a4aad38fb86162d25c57d5681e3f89b5073929530903b66db47c845f72" iface="eth0" netns="/var/run/netns/cni-908b4dd1-57ea-b8c9-2561-454f2d84b686" Mar 17 22:05:46.151666 env[1205]: 2025-03-17 22:05:45.937 [INFO][3403] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="94faf4a4aad38fb86162d25c57d5681e3f89b5073929530903b66db47c845f72" iface="eth0" netns="/var/run/netns/cni-908b4dd1-57ea-b8c9-2561-454f2d84b686" Mar 17 22:05:46.151666 env[1205]: 2025-03-17 22:05:45.938 [INFO][3403] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="94faf4a4aad38fb86162d25c57d5681e3f89b5073929530903b66db47c845f72" iface="eth0" netns="/var/run/netns/cni-908b4dd1-57ea-b8c9-2561-454f2d84b686" Mar 17 22:05:46.151666 env[1205]: 2025-03-17 22:05:45.938 [INFO][3403] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="94faf4a4aad38fb86162d25c57d5681e3f89b5073929530903b66db47c845f72" Mar 17 22:05:46.151666 env[1205]: 2025-03-17 22:05:45.938 [INFO][3403] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="94faf4a4aad38fb86162d25c57d5681e3f89b5073929530903b66db47c845f72" Mar 17 22:05:46.151666 env[1205]: 2025-03-17 22:05:46.109 [INFO][3495] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="94faf4a4aad38fb86162d25c57d5681e3f89b5073929530903b66db47c845f72" HandleID="k8s-pod-network.94faf4a4aad38fb86162d25c57d5681e3f89b5073929530903b66db47c845f72" Workload="srv--zbif7.gb1.brightbox.com-k8s-calico--apiserver--9cf959fb7--6grpc-eth0" Mar 17 22:05:46.151666 env[1205]: 2025-03-17 22:05:46.109 [INFO][3495] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 22:05:46.151666 env[1205]: 2025-03-17 22:05:46.109 [INFO][3495] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 22:05:46.151666 env[1205]: 2025-03-17 22:05:46.130 [WARNING][3495] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="94faf4a4aad38fb86162d25c57d5681e3f89b5073929530903b66db47c845f72" HandleID="k8s-pod-network.94faf4a4aad38fb86162d25c57d5681e3f89b5073929530903b66db47c845f72" Workload="srv--zbif7.gb1.brightbox.com-k8s-calico--apiserver--9cf959fb7--6grpc-eth0" Mar 17 22:05:46.151666 env[1205]: 2025-03-17 22:05:46.130 [INFO][3495] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="94faf4a4aad38fb86162d25c57d5681e3f89b5073929530903b66db47c845f72" HandleID="k8s-pod-network.94faf4a4aad38fb86162d25c57d5681e3f89b5073929530903b66db47c845f72" Workload="srv--zbif7.gb1.brightbox.com-k8s-calico--apiserver--9cf959fb7--6grpc-eth0" Mar 17 22:05:46.151666 env[1205]: 2025-03-17 22:05:46.137 [INFO][3495] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 22:05:46.151666 env[1205]: 2025-03-17 22:05:46.143 [INFO][3403] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="94faf4a4aad38fb86162d25c57d5681e3f89b5073929530903b66db47c845f72" Mar 17 22:05:46.155265 systemd[1]: run-netns-cni\x2d908b4dd1\x2d57ea\x2db8c9\x2d2561\x2d454f2d84b686.mount: Deactivated successfully. Mar 17 22:05:46.157807 env[1205]: time="2025-03-17T22:05:46.157736243Z" level=info msg="TearDown network for sandbox \"94faf4a4aad38fb86162d25c57d5681e3f89b5073929530903b66db47c845f72\" successfully" Mar 17 22:05:46.157965 env[1205]: time="2025-03-17T22:05:46.157929788Z" level=info msg="StopPodSandbox for \"94faf4a4aad38fb86162d25c57d5681e3f89b5073929530903b66db47c845f72\" returns successfully" Mar 17 22:05:46.159223 env[1205]: time="2025-03-17T22:05:46.159183158Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-9cf959fb7-6grpc,Uid:58155caf-9ac0-4f91-81aa-f85d1f16be02,Namespace:calico-apiserver,Attempt:1,}" Mar 17 22:05:46.162131 env[1205]: time="2025-03-17T22:05:46.161005610Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-9cf959fb7-wc2pd,Uid:6c786678-3d62-47ad-93a5-369b9da92261,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"c2e60aeef56d051dd5d8df49f29315b96f7b595d0a0efd6487fb1f7452307136\"" Mar 17 22:05:46.270000 audit[3536]: AVC avc: denied { write } for pid=3536 comm="tee" name="fd" dev="proc" ino=30992 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Mar 17 22:05:46.270000 audit[3536]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff86b01a06 a2=241 a3=1b6 items=1 ppid=3461 pid=3536 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:46.270000 audit: CWD cwd="/etc/service/enabled/bird6/log" Mar 17 22:05:46.270000 audit: PATH item=0 name="/dev/fd/63" inode=30260 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 22:05:46.270000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Mar 17 22:05:46.313000 audit[3583]: AVC avc: denied { write } for pid=3583 comm="tee" name="fd" dev="proc" ino=30998 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Mar 17 22:05:46.313000 audit[3583]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe26bd19f6 a2=241 a3=1b6 items=1 ppid=3468 pid=3583 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:46.313000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Mar 17 22:05:46.313000 audit: PATH item=0 name="/dev/fd/63" inode=30995 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 22:05:46.313000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Mar 17 22:05:46.378000 audit[3542]: AVC avc: denied { write } for pid=3542 comm="tee" name="fd" dev="proc" ino=30292 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Mar 17 22:05:46.378000 audit[3542]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd3da8ba06 a2=241 a3=1b6 items=1 ppid=3450 pid=3542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:46.387000 audit[3538]: AVC avc: denied { write } for pid=3538 comm="tee" name="fd" dev="proc" ino=30295 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Mar 17 22:05:46.388000 audit[3544]: AVC avc: denied { write } for pid=3544 comm="tee" name="fd" dev="proc" ino=30299 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Mar 17 22:05:46.388000 audit[3544]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff2e307a08 a2=241 a3=1b6 items=1 ppid=3451 pid=3544 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:46.387000 audit[3538]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc4c2389f7 a2=241 a3=1b6 items=1 ppid=3464 pid=3538 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:46.387000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Mar 17 22:05:46.387000 audit: PATH item=0 name="/dev/fd/63" inode=30263 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 22:05:46.387000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Mar 17 22:05:46.388000 audit: CWD cwd="/etc/service/enabled/cni/log" Mar 17 22:05:46.388000 audit: PATH item=0 name="/dev/fd/63" inode=30265 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 22:05:46.388000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Mar 17 22:05:46.394000 audit[3540]: AVC avc: denied { write } for pid=3540 comm="tee" name="fd" dev="proc" ino=30301 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Mar 17 22:05:46.394000 audit[3540]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe76f27a07 a2=241 a3=1b6 items=1 ppid=3453 pid=3540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:46.394000 audit: CWD cwd="/etc/service/enabled/bird/log" Mar 17 22:05:46.394000 audit: PATH item=0 name="/dev/fd/63" inode=30899 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 22:05:46.394000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Mar 17 22:05:46.378000 audit: CWD cwd="/etc/service/enabled/confd/log" Mar 17 22:05:46.378000 audit: PATH item=0 name="/dev/fd/63" inode=30264 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 22:05:46.378000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Mar 17 22:05:46.507137 systemd-networkd[1031]: cali394e9994a6f: Link UP Mar 17 22:05:46.516444 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Mar 17 22:05:46.516743 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali394e9994a6f: link becomes ready Mar 17 22:05:46.517054 systemd-networkd[1031]: cali394e9994a6f: Gained carrier Mar 17 22:05:46.549619 env[1205]: 2025-03-17 22:05:46.228 [INFO][3516] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist Mar 17 22:05:46.549619 env[1205]: 2025-03-17 22:05:46.269 [INFO][3516] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {srv--zbif7.gb1.brightbox.com-k8s-calico--kube--controllers--df4ccfbfc--h8m5j-eth0 calico-kube-controllers-df4ccfbfc- calico-system 62b3841b-0f84-466f-921a-c6f2f9062835 797 0 2025-03-17 22:05:14 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:df4ccfbfc projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s srv-zbif7.gb1.brightbox.com calico-kube-controllers-df4ccfbfc-h8m5j eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali394e9994a6f [] []}} ContainerID="a9506756dd2c6d8172cef2e734f8497688fa20b88e335776a7112a23e73fce38" Namespace="calico-system" Pod="calico-kube-controllers-df4ccfbfc-h8m5j" WorkloadEndpoint="srv--zbif7.gb1.brightbox.com-k8s-calico--kube--controllers--df4ccfbfc--h8m5j-" Mar 17 22:05:46.549619 env[1205]: 2025-03-17 22:05:46.270 [INFO][3516] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="a9506756dd2c6d8172cef2e734f8497688fa20b88e335776a7112a23e73fce38" Namespace="calico-system" Pod="calico-kube-controllers-df4ccfbfc-h8m5j" WorkloadEndpoint="srv--zbif7.gb1.brightbox.com-k8s-calico--kube--controllers--df4ccfbfc--h8m5j-eth0" Mar 17 22:05:46.549619 env[1205]: 2025-03-17 22:05:46.354 [INFO][3575] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="a9506756dd2c6d8172cef2e734f8497688fa20b88e335776a7112a23e73fce38" HandleID="k8s-pod-network.a9506756dd2c6d8172cef2e734f8497688fa20b88e335776a7112a23e73fce38" Workload="srv--zbif7.gb1.brightbox.com-k8s-calico--kube--controllers--df4ccfbfc--h8m5j-eth0" Mar 17 22:05:46.549619 env[1205]: 2025-03-17 22:05:46.374 [INFO][3575] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="a9506756dd2c6d8172cef2e734f8497688fa20b88e335776a7112a23e73fce38" HandleID="k8s-pod-network.a9506756dd2c6d8172cef2e734f8497688fa20b88e335776a7112a23e73fce38" Workload="srv--zbif7.gb1.brightbox.com-k8s-calico--kube--controllers--df4ccfbfc--h8m5j-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000310ea0), Attrs:map[string]string{"namespace":"calico-system", "node":"srv-zbif7.gb1.brightbox.com", "pod":"calico-kube-controllers-df4ccfbfc-h8m5j", "timestamp":"2025-03-17 22:05:46.353977702 +0000 UTC"}, Hostname:"srv-zbif7.gb1.brightbox.com", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Mar 17 22:05:46.549619 env[1205]: 2025-03-17 22:05:46.375 [INFO][3575] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 22:05:46.549619 env[1205]: 2025-03-17 22:05:46.375 [INFO][3575] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 22:05:46.549619 env[1205]: 2025-03-17 22:05:46.375 [INFO][3575] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'srv-zbif7.gb1.brightbox.com' Mar 17 22:05:46.549619 env[1205]: 2025-03-17 22:05:46.382 [INFO][3575] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.a9506756dd2c6d8172cef2e734f8497688fa20b88e335776a7112a23e73fce38" host="srv-zbif7.gb1.brightbox.com" Mar 17 22:05:46.549619 env[1205]: 2025-03-17 22:05:46.397 [INFO][3575] ipam/ipam.go 372: Looking up existing affinities for host host="srv-zbif7.gb1.brightbox.com" Mar 17 22:05:46.549619 env[1205]: 2025-03-17 22:05:46.407 [INFO][3575] ipam/ipam.go 489: Trying affinity for 192.168.17.64/26 host="srv-zbif7.gb1.brightbox.com" Mar 17 22:05:46.549619 env[1205]: 2025-03-17 22:05:46.411 [INFO][3575] ipam/ipam.go 155: Attempting to load block cidr=192.168.17.64/26 host="srv-zbif7.gb1.brightbox.com" Mar 17 22:05:46.549619 env[1205]: 2025-03-17 22:05:46.416 [INFO][3575] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.17.64/26 host="srv-zbif7.gb1.brightbox.com" Mar 17 22:05:46.549619 env[1205]: 2025-03-17 22:05:46.416 [INFO][3575] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.17.64/26 handle="k8s-pod-network.a9506756dd2c6d8172cef2e734f8497688fa20b88e335776a7112a23e73fce38" host="srv-zbif7.gb1.brightbox.com" Mar 17 22:05:46.549619 env[1205]: 2025-03-17 22:05:46.420 [INFO][3575] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.a9506756dd2c6d8172cef2e734f8497688fa20b88e335776a7112a23e73fce38 Mar 17 22:05:46.549619 env[1205]: 2025-03-17 22:05:46.428 [INFO][3575] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.17.64/26 handle="k8s-pod-network.a9506756dd2c6d8172cef2e734f8497688fa20b88e335776a7112a23e73fce38" host="srv-zbif7.gb1.brightbox.com" Mar 17 22:05:46.549619 env[1205]: 2025-03-17 22:05:46.452 [INFO][3575] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.17.67/26] block=192.168.17.64/26 handle="k8s-pod-network.a9506756dd2c6d8172cef2e734f8497688fa20b88e335776a7112a23e73fce38" host="srv-zbif7.gb1.brightbox.com" Mar 17 22:05:46.549619 env[1205]: 2025-03-17 22:05:46.452 [INFO][3575] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.17.67/26] handle="k8s-pod-network.a9506756dd2c6d8172cef2e734f8497688fa20b88e335776a7112a23e73fce38" host="srv-zbif7.gb1.brightbox.com" Mar 17 22:05:46.549619 env[1205]: 2025-03-17 22:05:46.452 [INFO][3575] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 22:05:46.549619 env[1205]: 2025-03-17 22:05:46.452 [INFO][3575] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.17.67/26] IPv6=[] ContainerID="a9506756dd2c6d8172cef2e734f8497688fa20b88e335776a7112a23e73fce38" HandleID="k8s-pod-network.a9506756dd2c6d8172cef2e734f8497688fa20b88e335776a7112a23e73fce38" Workload="srv--zbif7.gb1.brightbox.com-k8s-calico--kube--controllers--df4ccfbfc--h8m5j-eth0" Mar 17 22:05:46.552273 env[1205]: 2025-03-17 22:05:46.470 [INFO][3516] cni-plugin/k8s.go 386: Populated endpoint ContainerID="a9506756dd2c6d8172cef2e734f8497688fa20b88e335776a7112a23e73fce38" Namespace="calico-system" Pod="calico-kube-controllers-df4ccfbfc-h8m5j" WorkloadEndpoint="srv--zbif7.gb1.brightbox.com-k8s-calico--kube--controllers--df4ccfbfc--h8m5j-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--zbif7.gb1.brightbox.com-k8s-calico--kube--controllers--df4ccfbfc--h8m5j-eth0", GenerateName:"calico-kube-controllers-df4ccfbfc-", Namespace:"calico-system", SelfLink:"", UID:"62b3841b-0f84-466f-921a-c6f2f9062835", ResourceVersion:"797", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 22, 5, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"df4ccfbfc", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-zbif7.gb1.brightbox.com", ContainerID:"", Pod:"calico-kube-controllers-df4ccfbfc-h8m5j", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.17.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali394e9994a6f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 22:05:46.552273 env[1205]: 2025-03-17 22:05:46.470 [INFO][3516] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.17.67/32] ContainerID="a9506756dd2c6d8172cef2e734f8497688fa20b88e335776a7112a23e73fce38" Namespace="calico-system" Pod="calico-kube-controllers-df4ccfbfc-h8m5j" WorkloadEndpoint="srv--zbif7.gb1.brightbox.com-k8s-calico--kube--controllers--df4ccfbfc--h8m5j-eth0" Mar 17 22:05:46.552273 env[1205]: 2025-03-17 22:05:46.470 [INFO][3516] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali394e9994a6f ContainerID="a9506756dd2c6d8172cef2e734f8497688fa20b88e335776a7112a23e73fce38" Namespace="calico-system" Pod="calico-kube-controllers-df4ccfbfc-h8m5j" WorkloadEndpoint="srv--zbif7.gb1.brightbox.com-k8s-calico--kube--controllers--df4ccfbfc--h8m5j-eth0" Mar 17 22:05:46.552273 env[1205]: 2025-03-17 22:05:46.519 [INFO][3516] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="a9506756dd2c6d8172cef2e734f8497688fa20b88e335776a7112a23e73fce38" Namespace="calico-system" Pod="calico-kube-controllers-df4ccfbfc-h8m5j" WorkloadEndpoint="srv--zbif7.gb1.brightbox.com-k8s-calico--kube--controllers--df4ccfbfc--h8m5j-eth0" Mar 17 22:05:46.552273 env[1205]: 2025-03-17 22:05:46.519 [INFO][3516] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="a9506756dd2c6d8172cef2e734f8497688fa20b88e335776a7112a23e73fce38" Namespace="calico-system" Pod="calico-kube-controllers-df4ccfbfc-h8m5j" WorkloadEndpoint="srv--zbif7.gb1.brightbox.com-k8s-calico--kube--controllers--df4ccfbfc--h8m5j-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--zbif7.gb1.brightbox.com-k8s-calico--kube--controllers--df4ccfbfc--h8m5j-eth0", GenerateName:"calico-kube-controllers-df4ccfbfc-", Namespace:"calico-system", SelfLink:"", UID:"62b3841b-0f84-466f-921a-c6f2f9062835", ResourceVersion:"797", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 22, 5, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"df4ccfbfc", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-zbif7.gb1.brightbox.com", ContainerID:"a9506756dd2c6d8172cef2e734f8497688fa20b88e335776a7112a23e73fce38", Pod:"calico-kube-controllers-df4ccfbfc-h8m5j", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.17.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali394e9994a6f", MAC:"5e:76:67:45:7c:60", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 22:05:46.552273 env[1205]: 2025-03-17 22:05:46.543 [INFO][3516] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="a9506756dd2c6d8172cef2e734f8497688fa20b88e335776a7112a23e73fce38" Namespace="calico-system" Pod="calico-kube-controllers-df4ccfbfc-h8m5j" WorkloadEndpoint="srv--zbif7.gb1.brightbox.com-k8s-calico--kube--controllers--df4ccfbfc--h8m5j-eth0" Mar 17 22:05:46.592734 env[1205]: time="2025-03-17T22:05:46.591132381Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Mar 17 22:05:46.592734 env[1205]: time="2025-03-17T22:05:46.591247872Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Mar 17 22:05:46.592734 env[1205]: time="2025-03-17T22:05:46.591311941Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Mar 17 22:05:46.592734 env[1205]: time="2025-03-17T22:05:46.591759075Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a9506756dd2c6d8172cef2e734f8497688fa20b88e335776a7112a23e73fce38 pid=3625 runtime=io.containerd.runc.v2 Mar 17 22:05:46.593483 env[1205]: time="2025-03-17T22:05:46.593437240Z" level=info msg="StopPodSandbox for \"84663afd621e7b0c4c243d86e5ea066a007eb77478f0a01766ef588875860094\"" Mar 17 22:05:46.664329 systemd[1]: Started cri-containerd-a9506756dd2c6d8172cef2e734f8497688fa20b88e335776a7112a23e73fce38.scope. Mar 17 22:05:46.785029 systemd-networkd[1031]: calib727b1bc4f5: Link UP Mar 17 22:05:46.787855 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calib727b1bc4f5: link becomes ready Mar 17 22:05:46.787408 systemd-networkd[1031]: calib727b1bc4f5: Gained carrier Mar 17 22:05:46.795816 sshd[3175]: Failed password for invalid user hikvision from 143.110.184.217 port 46908 ssh2 Mar 17 22:05:46.839112 systemd-networkd[1031]: califfa9ffe3af9: Gained IPv6LL Mar 17 22:05:46.876501 env[1205]: 2025-03-17 22:05:46.371 [INFO][3554] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist Mar 17 22:05:46.876501 env[1205]: 2025-03-17 22:05:46.408 [INFO][3554] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {srv--zbif7.gb1.brightbox.com-k8s-calico--apiserver--9cf959fb7--6grpc-eth0 calico-apiserver-9cf959fb7- calico-apiserver 58155caf-9ac0-4f91-81aa-f85d1f16be02 798 0 2025-03-17 22:05:13 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:9cf959fb7 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s srv-zbif7.gb1.brightbox.com calico-apiserver-9cf959fb7-6grpc eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calib727b1bc4f5 [] []}} ContainerID="0a42b9824783a104f971969eaf7d3117b7ff1b2dd02515b4fccce50a5b7688b8" Namespace="calico-apiserver" Pod="calico-apiserver-9cf959fb7-6grpc" WorkloadEndpoint="srv--zbif7.gb1.brightbox.com-k8s-calico--apiserver--9cf959fb7--6grpc-" Mar 17 22:05:46.876501 env[1205]: 2025-03-17 22:05:46.408 [INFO][3554] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="0a42b9824783a104f971969eaf7d3117b7ff1b2dd02515b4fccce50a5b7688b8" Namespace="calico-apiserver" Pod="calico-apiserver-9cf959fb7-6grpc" WorkloadEndpoint="srv--zbif7.gb1.brightbox.com-k8s-calico--apiserver--9cf959fb7--6grpc-eth0" Mar 17 22:05:46.876501 env[1205]: 2025-03-17 22:05:46.499 [INFO][3595] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="0a42b9824783a104f971969eaf7d3117b7ff1b2dd02515b4fccce50a5b7688b8" HandleID="k8s-pod-network.0a42b9824783a104f971969eaf7d3117b7ff1b2dd02515b4fccce50a5b7688b8" Workload="srv--zbif7.gb1.brightbox.com-k8s-calico--apiserver--9cf959fb7--6grpc-eth0" Mar 17 22:05:46.876501 env[1205]: 2025-03-17 22:05:46.645 [INFO][3595] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="0a42b9824783a104f971969eaf7d3117b7ff1b2dd02515b4fccce50a5b7688b8" HandleID="k8s-pod-network.0a42b9824783a104f971969eaf7d3117b7ff1b2dd02515b4fccce50a5b7688b8" Workload="srv--zbif7.gb1.brightbox.com-k8s-calico--apiserver--9cf959fb7--6grpc-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000310960), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"srv-zbif7.gb1.brightbox.com", "pod":"calico-apiserver-9cf959fb7-6grpc", "timestamp":"2025-03-17 22:05:46.499374786 +0000 UTC"}, Hostname:"srv-zbif7.gb1.brightbox.com", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Mar 17 22:05:46.876501 env[1205]: 2025-03-17 22:05:46.645 [INFO][3595] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 22:05:46.876501 env[1205]: 2025-03-17 22:05:46.645 [INFO][3595] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 22:05:46.876501 env[1205]: 2025-03-17 22:05:46.645 [INFO][3595] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'srv-zbif7.gb1.brightbox.com' Mar 17 22:05:46.876501 env[1205]: 2025-03-17 22:05:46.672 [INFO][3595] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.0a42b9824783a104f971969eaf7d3117b7ff1b2dd02515b4fccce50a5b7688b8" host="srv-zbif7.gb1.brightbox.com" Mar 17 22:05:46.876501 env[1205]: 2025-03-17 22:05:46.698 [INFO][3595] ipam/ipam.go 372: Looking up existing affinities for host host="srv-zbif7.gb1.brightbox.com" Mar 17 22:05:46.876501 env[1205]: 2025-03-17 22:05:46.716 [INFO][3595] ipam/ipam.go 489: Trying affinity for 192.168.17.64/26 host="srv-zbif7.gb1.brightbox.com" Mar 17 22:05:46.876501 env[1205]: 2025-03-17 22:05:46.721 [INFO][3595] ipam/ipam.go 155: Attempting to load block cidr=192.168.17.64/26 host="srv-zbif7.gb1.brightbox.com" Mar 17 22:05:46.876501 env[1205]: 2025-03-17 22:05:46.726 [INFO][3595] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.17.64/26 host="srv-zbif7.gb1.brightbox.com" Mar 17 22:05:46.876501 env[1205]: 2025-03-17 22:05:46.726 [INFO][3595] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.17.64/26 handle="k8s-pod-network.0a42b9824783a104f971969eaf7d3117b7ff1b2dd02515b4fccce50a5b7688b8" host="srv-zbif7.gb1.brightbox.com" Mar 17 22:05:46.876501 env[1205]: 2025-03-17 22:05:46.729 [INFO][3595] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.0a42b9824783a104f971969eaf7d3117b7ff1b2dd02515b4fccce50a5b7688b8 Mar 17 22:05:46.876501 env[1205]: 2025-03-17 22:05:46.738 [INFO][3595] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.17.64/26 handle="k8s-pod-network.0a42b9824783a104f971969eaf7d3117b7ff1b2dd02515b4fccce50a5b7688b8" host="srv-zbif7.gb1.brightbox.com" Mar 17 22:05:46.876501 env[1205]: 2025-03-17 22:05:46.750 [INFO][3595] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.17.68/26] block=192.168.17.64/26 handle="k8s-pod-network.0a42b9824783a104f971969eaf7d3117b7ff1b2dd02515b4fccce50a5b7688b8" host="srv-zbif7.gb1.brightbox.com" Mar 17 22:05:46.876501 env[1205]: 2025-03-17 22:05:46.750 [INFO][3595] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.17.68/26] handle="k8s-pod-network.0a42b9824783a104f971969eaf7d3117b7ff1b2dd02515b4fccce50a5b7688b8" host="srv-zbif7.gb1.brightbox.com" Mar 17 22:05:46.876501 env[1205]: 2025-03-17 22:05:46.750 [INFO][3595] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 22:05:46.876501 env[1205]: 2025-03-17 22:05:46.750 [INFO][3595] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.17.68/26] IPv6=[] ContainerID="0a42b9824783a104f971969eaf7d3117b7ff1b2dd02515b4fccce50a5b7688b8" HandleID="k8s-pod-network.0a42b9824783a104f971969eaf7d3117b7ff1b2dd02515b4fccce50a5b7688b8" Workload="srv--zbif7.gb1.brightbox.com-k8s-calico--apiserver--9cf959fb7--6grpc-eth0" Mar 17 22:05:46.878694 env[1205]: 2025-03-17 22:05:46.757 [INFO][3554] cni-plugin/k8s.go 386: Populated endpoint ContainerID="0a42b9824783a104f971969eaf7d3117b7ff1b2dd02515b4fccce50a5b7688b8" Namespace="calico-apiserver" Pod="calico-apiserver-9cf959fb7-6grpc" WorkloadEndpoint="srv--zbif7.gb1.brightbox.com-k8s-calico--apiserver--9cf959fb7--6grpc-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--zbif7.gb1.brightbox.com-k8s-calico--apiserver--9cf959fb7--6grpc-eth0", GenerateName:"calico-apiserver-9cf959fb7-", Namespace:"calico-apiserver", SelfLink:"", UID:"58155caf-9ac0-4f91-81aa-f85d1f16be02", ResourceVersion:"798", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 22, 5, 13, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"9cf959fb7", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-zbif7.gb1.brightbox.com", ContainerID:"", Pod:"calico-apiserver-9cf959fb7-6grpc", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.17.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calib727b1bc4f5", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 22:05:46.878694 env[1205]: 2025-03-17 22:05:46.758 [INFO][3554] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.17.68/32] ContainerID="0a42b9824783a104f971969eaf7d3117b7ff1b2dd02515b4fccce50a5b7688b8" Namespace="calico-apiserver" Pod="calico-apiserver-9cf959fb7-6grpc" WorkloadEndpoint="srv--zbif7.gb1.brightbox.com-k8s-calico--apiserver--9cf959fb7--6grpc-eth0" Mar 17 22:05:46.878694 env[1205]: 2025-03-17 22:05:46.758 [INFO][3554] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calib727b1bc4f5 ContainerID="0a42b9824783a104f971969eaf7d3117b7ff1b2dd02515b4fccce50a5b7688b8" Namespace="calico-apiserver" Pod="calico-apiserver-9cf959fb7-6grpc" WorkloadEndpoint="srv--zbif7.gb1.brightbox.com-k8s-calico--apiserver--9cf959fb7--6grpc-eth0" Mar 17 22:05:46.878694 env[1205]: 2025-03-17 22:05:46.787 [INFO][3554] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="0a42b9824783a104f971969eaf7d3117b7ff1b2dd02515b4fccce50a5b7688b8" Namespace="calico-apiserver" Pod="calico-apiserver-9cf959fb7-6grpc" WorkloadEndpoint="srv--zbif7.gb1.brightbox.com-k8s-calico--apiserver--9cf959fb7--6grpc-eth0" Mar 17 22:05:46.878694 env[1205]: 2025-03-17 22:05:46.788 [INFO][3554] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="0a42b9824783a104f971969eaf7d3117b7ff1b2dd02515b4fccce50a5b7688b8" Namespace="calico-apiserver" Pod="calico-apiserver-9cf959fb7-6grpc" WorkloadEndpoint="srv--zbif7.gb1.brightbox.com-k8s-calico--apiserver--9cf959fb7--6grpc-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--zbif7.gb1.brightbox.com-k8s-calico--apiserver--9cf959fb7--6grpc-eth0", GenerateName:"calico-apiserver-9cf959fb7-", Namespace:"calico-apiserver", SelfLink:"", UID:"58155caf-9ac0-4f91-81aa-f85d1f16be02", ResourceVersion:"798", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 22, 5, 13, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"9cf959fb7", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-zbif7.gb1.brightbox.com", ContainerID:"0a42b9824783a104f971969eaf7d3117b7ff1b2dd02515b4fccce50a5b7688b8", Pod:"calico-apiserver-9cf959fb7-6grpc", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.17.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calib727b1bc4f5", MAC:"02:fd:d2:45:ec:09", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 22:05:46.878694 env[1205]: 2025-03-17 22:05:46.874 [INFO][3554] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="0a42b9824783a104f971969eaf7d3117b7ff1b2dd02515b4fccce50a5b7688b8" Namespace="calico-apiserver" Pod="calico-apiserver-9cf959fb7-6grpc" WorkloadEndpoint="srv--zbif7.gb1.brightbox.com-k8s-calico--apiserver--9cf959fb7--6grpc-eth0" Mar 17 22:05:46.930836 env[1205]: time="2025-03-17T22:05:46.930711829Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Mar 17 22:05:46.931168 env[1205]: time="2025-03-17T22:05:46.930792566Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Mar 17 22:05:46.931168 env[1205]: time="2025-03-17T22:05:46.930810050Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Mar 17 22:05:46.931168 env[1205]: time="2025-03-17T22:05:46.931076947Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0a42b9824783a104f971969eaf7d3117b7ff1b2dd02515b4fccce50a5b7688b8 pid=3694 runtime=io.containerd.runc.v2 Mar 17 22:05:46.970854 systemd[1]: Started cri-containerd-0a42b9824783a104f971969eaf7d3117b7ff1b2dd02515b4fccce50a5b7688b8.scope. Mar 17 22:05:46.984329 env[1205]: 2025-03-17 22:05:46.835 [INFO][3657] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="84663afd621e7b0c4c243d86e5ea066a007eb77478f0a01766ef588875860094" Mar 17 22:05:46.984329 env[1205]: 2025-03-17 22:05:46.836 [INFO][3657] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="84663afd621e7b0c4c243d86e5ea066a007eb77478f0a01766ef588875860094" iface="eth0" netns="/var/run/netns/cni-88990de5-b96b-6867-0912-dccc61f1e7be" Mar 17 22:05:46.984329 env[1205]: 2025-03-17 22:05:46.836 [INFO][3657] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="84663afd621e7b0c4c243d86e5ea066a007eb77478f0a01766ef588875860094" iface="eth0" netns="/var/run/netns/cni-88990de5-b96b-6867-0912-dccc61f1e7be" Mar 17 22:05:46.984329 env[1205]: 2025-03-17 22:05:46.836 [INFO][3657] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="84663afd621e7b0c4c243d86e5ea066a007eb77478f0a01766ef588875860094" iface="eth0" netns="/var/run/netns/cni-88990de5-b96b-6867-0912-dccc61f1e7be" Mar 17 22:05:46.984329 env[1205]: 2025-03-17 22:05:46.836 [INFO][3657] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="84663afd621e7b0c4c243d86e5ea066a007eb77478f0a01766ef588875860094" Mar 17 22:05:46.984329 env[1205]: 2025-03-17 22:05:46.836 [INFO][3657] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="84663afd621e7b0c4c243d86e5ea066a007eb77478f0a01766ef588875860094" Mar 17 22:05:46.984329 env[1205]: 2025-03-17 22:05:46.946 [INFO][3675] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="84663afd621e7b0c4c243d86e5ea066a007eb77478f0a01766ef588875860094" HandleID="k8s-pod-network.84663afd621e7b0c4c243d86e5ea066a007eb77478f0a01766ef588875860094" Workload="srv--zbif7.gb1.brightbox.com-k8s-coredns--668d6bf9bc--67bbv-eth0" Mar 17 22:05:46.984329 env[1205]: 2025-03-17 22:05:46.948 [INFO][3675] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 22:05:46.984329 env[1205]: 2025-03-17 22:05:46.949 [INFO][3675] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 22:05:46.984329 env[1205]: 2025-03-17 22:05:46.976 [WARNING][3675] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="84663afd621e7b0c4c243d86e5ea066a007eb77478f0a01766ef588875860094" HandleID="k8s-pod-network.84663afd621e7b0c4c243d86e5ea066a007eb77478f0a01766ef588875860094" Workload="srv--zbif7.gb1.brightbox.com-k8s-coredns--668d6bf9bc--67bbv-eth0" Mar 17 22:05:46.984329 env[1205]: 2025-03-17 22:05:46.976 [INFO][3675] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="84663afd621e7b0c4c243d86e5ea066a007eb77478f0a01766ef588875860094" HandleID="k8s-pod-network.84663afd621e7b0c4c243d86e5ea066a007eb77478f0a01766ef588875860094" Workload="srv--zbif7.gb1.brightbox.com-k8s-coredns--668d6bf9bc--67bbv-eth0" Mar 17 22:05:46.984329 env[1205]: 2025-03-17 22:05:46.978 [INFO][3675] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 22:05:46.984329 env[1205]: 2025-03-17 22:05:46.981 [INFO][3657] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="84663afd621e7b0c4c243d86e5ea066a007eb77478f0a01766ef588875860094" Mar 17 22:05:46.984329 env[1205]: time="2025-03-17T22:05:46.984109680Z" level=info msg="TearDown network for sandbox \"84663afd621e7b0c4c243d86e5ea066a007eb77478f0a01766ef588875860094\" successfully" Mar 17 22:05:46.984329 env[1205]: time="2025-03-17T22:05:46.984156570Z" level=info msg="StopPodSandbox for \"84663afd621e7b0c4c243d86e5ea066a007eb77478f0a01766ef588875860094\" returns successfully" Mar 17 22:05:46.985483 env[1205]: time="2025-03-17T22:05:46.985038857Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-67bbv,Uid:630555ef-bf08-4b1a-91a4-a1ce8eafa62c,Namespace:kube-system,Attempt:1,}" Mar 17 22:05:47.047000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.049799 kernel: kauditd_printk_skb: 185 callbacks suppressed Mar 17 22:05:47.049925 kernel: audit: type=1400 audit(1742249147.047:1095): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.047000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.070768 kernel: audit: type=1400 audit(1742249147.047:1096): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.078836 kernel: audit: type=1400 audit(1742249147.047:1097): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.078970 kernel: audit: type=1400 audit(1742249147.047:1098): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.047000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.082388 systemd[1]: run-netns-cni\x2d88990de5\x2db96b\x2d6867\x2d0912\x2ddccc61f1e7be.mount: Deactivated successfully. Mar 17 22:05:47.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.093753 kernel: audit: type=1400 audit(1742249147.047:1099): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.094026 kernel: audit: type=1400 audit(1742249147.047:1100): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.105587 kernel: audit: type=1400 audit(1742249147.047:1101): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.105766 kernel: audit: type=1400 audit(1742249147.047:1102): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.047000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.119516 kernel: audit: type=1400 audit(1742249147.047:1103): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.119685 kernel: audit: type=1400 audit(1742249147.047:1104): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.047000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.047000 audit: BPF prog-id=147 op=LOAD Mar 17 22:05:47.054000 audit[3640]: AVC avc: denied { bpf } for pid=3640 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.054000 audit[3640]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3625 pid=3640 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:47.054000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139353036373536646432633664383137326365663265373334663834 Mar 17 22:05:47.054000 audit[3640]: AVC avc: denied { perfmon } for pid=3640 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.054000 audit[3640]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3625 pid=3640 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:47.054000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139353036373536646432633664383137326365663265373334663834 Mar 17 22:05:47.054000 audit[3640]: AVC avc: denied { bpf } for pid=3640 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.054000 audit[3640]: AVC avc: denied { bpf } for pid=3640 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.054000 audit[3640]: AVC avc: denied { bpf } for pid=3640 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.054000 audit[3640]: AVC avc: denied { perfmon } for pid=3640 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.054000 audit[3640]: AVC avc: denied { perfmon } for pid=3640 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.054000 audit[3640]: AVC avc: denied { perfmon } for pid=3640 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.054000 audit[3640]: AVC avc: denied { perfmon } for pid=3640 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.054000 audit[3640]: AVC avc: denied { perfmon } for pid=3640 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.054000 audit[3640]: AVC avc: denied { bpf } for pid=3640 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.054000 audit[3640]: AVC avc: denied { bpf } for pid=3640 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.054000 audit: BPF prog-id=148 op=LOAD Mar 17 22:05:47.054000 audit[3640]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001cadd0 items=0 ppid=3625 pid=3640 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:47.054000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139353036373536646432633664383137326365663265373334663834 Mar 17 22:05:47.054000 audit[3640]: AVC avc: denied { bpf } for pid=3640 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.054000 audit[3640]: AVC avc: denied { bpf } for pid=3640 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.054000 audit[3640]: AVC avc: denied { perfmon } for pid=3640 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.054000 audit[3640]: AVC avc: denied { perfmon } for pid=3640 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.054000 audit[3640]: AVC avc: denied { perfmon } for pid=3640 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.054000 audit[3640]: AVC avc: denied { perfmon } for pid=3640 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.054000 audit[3640]: AVC avc: denied { perfmon } for pid=3640 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.054000 audit[3640]: AVC avc: denied { bpf } for pid=3640 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.054000 audit[3640]: AVC avc: denied { bpf } for pid=3640 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.054000 audit: BPF prog-id=149 op=LOAD Mar 17 22:05:47.054000 audit[3640]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001cae18 items=0 ppid=3625 pid=3640 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:47.054000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139353036373536646432633664383137326365663265373334663834 Mar 17 22:05:47.054000 audit: BPF prog-id=149 op=UNLOAD Mar 17 22:05:47.055000 audit: BPF prog-id=148 op=UNLOAD Mar 17 22:05:47.055000 audit[3640]: AVC avc: denied { bpf } for pid=3640 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.055000 audit[3640]: AVC avc: denied { bpf } for pid=3640 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.055000 audit[3640]: AVC avc: denied { bpf } for pid=3640 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.055000 audit[3640]: AVC avc: denied { perfmon } for pid=3640 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.055000 audit[3640]: AVC avc: denied { perfmon } for pid=3640 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.055000 audit[3640]: AVC avc: denied { perfmon } for pid=3640 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.055000 audit[3640]: AVC avc: denied { perfmon } for pid=3640 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.055000 audit[3640]: AVC avc: denied { perfmon } for pid=3640 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.055000 audit[3640]: AVC avc: denied { bpf } for pid=3640 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.055000 audit[3640]: AVC avc: denied { bpf } for pid=3640 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.055000 audit: BPF prog-id=150 op=LOAD Mar 17 22:05:47.055000 audit[3640]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001cb228 items=0 ppid=3625 pid=3640 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:47.055000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139353036373536646432633664383137326365663265373334663834 Mar 17 22:05:47.242679 systemd-networkd[1031]: cali7dbd006b3e8: Gained IPv6LL Mar 17 22:05:47.244000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.244000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.244000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.244000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.244000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.244000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.244000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.244000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.244000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.244000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.244000 audit: BPF prog-id=151 op=LOAD Mar 17 22:05:47.245000 audit[3703]: AVC avc: denied { bpf } for pid=3703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.245000 audit[3703]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=3694 pid=3703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:47.245000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061343262393832343738336131303466393731393639656166376433 Mar 17 22:05:47.245000 audit[3703]: AVC avc: denied { perfmon } for pid=3703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.245000 audit[3703]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=3694 pid=3703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:47.245000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061343262393832343738336131303466393731393639656166376433 Mar 17 22:05:47.246000 audit[3703]: AVC avc: denied { bpf } for pid=3703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.246000 audit[3703]: AVC avc: denied { bpf } for pid=3703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.246000 audit[3703]: AVC avc: denied { bpf } for pid=3703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.246000 audit[3703]: AVC avc: denied { perfmon } for pid=3703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.246000 audit[3703]: AVC avc: denied { perfmon } for pid=3703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.246000 audit[3703]: AVC avc: denied { perfmon } for pid=3703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.246000 audit[3703]: AVC avc: denied { perfmon } for pid=3703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.246000 audit[3703]: AVC avc: denied { perfmon } for pid=3703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.246000 audit[3703]: AVC avc: denied { bpf } for pid=3703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.246000 audit[3703]: AVC avc: denied { bpf } for pid=3703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.246000 audit: BPF prog-id=152 op=LOAD Mar 17 22:05:47.246000 audit[3703]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c00038c730 items=0 ppid=3694 pid=3703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:47.246000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061343262393832343738336131303466393731393639656166376433 Mar 17 22:05:47.247000 audit[3703]: AVC avc: denied { bpf } for pid=3703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.247000 audit[3703]: AVC avc: denied { bpf } for pid=3703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.247000 audit[3703]: AVC avc: denied { perfmon } for pid=3703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.247000 audit[3703]: AVC avc: denied { perfmon } for pid=3703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.247000 audit[3703]: AVC avc: denied { perfmon } for pid=3703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.247000 audit[3703]: AVC avc: denied { perfmon } for pid=3703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.247000 audit[3703]: AVC avc: denied { perfmon } for pid=3703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.247000 audit[3703]: AVC avc: denied { bpf } for pid=3703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.247000 audit[3703]: AVC avc: denied { bpf } for pid=3703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.247000 audit: BPF prog-id=153 op=LOAD Mar 17 22:05:47.247000 audit[3703]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c00038c778 items=0 ppid=3694 pid=3703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:47.247000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061343262393832343738336131303466393731393639656166376433 Mar 17 22:05:47.247000 audit: BPF prog-id=153 op=UNLOAD Mar 17 22:05:47.247000 audit: BPF prog-id=152 op=UNLOAD Mar 17 22:05:47.247000 audit[3703]: AVC avc: denied { bpf } for pid=3703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.247000 audit[3703]: AVC avc: denied { bpf } for pid=3703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.247000 audit[3703]: AVC avc: denied { bpf } for pid=3703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.247000 audit[3703]: AVC avc: denied { perfmon } for pid=3703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.247000 audit[3703]: AVC avc: denied { perfmon } for pid=3703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.247000 audit[3703]: AVC avc: denied { perfmon } for pid=3703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.247000 audit[3703]: AVC avc: denied { perfmon } for pid=3703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.247000 audit[3703]: AVC avc: denied { perfmon } for pid=3703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.247000 audit[3703]: AVC avc: denied { bpf } for pid=3703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.247000 audit[3703]: AVC avc: denied { bpf } for pid=3703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.247000 audit: BPF prog-id=154 op=LOAD Mar 17 22:05:47.247000 audit[3703]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c00038cb88 items=0 ppid=3694 pid=3703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:47.247000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061343262393832343738336131303466393731393639656166376433 Mar 17 22:05:47.302036 env[1205]: time="2025-03-17T22:05:47.301974353Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-df4ccfbfc-h8m5j,Uid:62b3841b-0f84-466f-921a-c6f2f9062835,Namespace:calico-system,Attempt:1,} returns sandbox id \"a9506756dd2c6d8172cef2e734f8497688fa20b88e335776a7112a23e73fce38\"" Mar 17 22:05:47.376170 env[1205]: time="2025-03-17T22:05:47.376015254Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-9cf959fb7-6grpc,Uid:58155caf-9ac0-4f91-81aa-f85d1f16be02,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"0a42b9824783a104f971969eaf7d3117b7ff1b2dd02515b4fccce50a5b7688b8\"" Mar 17 22:05:47.414000 audit[3765]: AVC avc: denied { bpf } for pid=3765 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.414000 audit[3765]: AVC avc: denied { bpf } for pid=3765 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.414000 audit[3765]: AVC avc: denied { perfmon } for pid=3765 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.414000 audit[3765]: AVC avc: denied { perfmon } for pid=3765 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.414000 audit[3765]: AVC avc: denied { perfmon } for pid=3765 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.414000 audit[3765]: AVC avc: denied { perfmon } for pid=3765 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.414000 audit[3765]: AVC avc: denied { perfmon } for pid=3765 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.414000 audit[3765]: AVC avc: denied { bpf } for pid=3765 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.414000 audit[3765]: AVC avc: denied { bpf } for pid=3765 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.414000 audit: BPF prog-id=155 op=LOAD Mar 17 22:05:47.414000 audit[3765]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffeaa8c7210 a2=98 a3=3 items=0 ppid=3455 pid=3765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:47.414000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 22:05:47.415000 audit: BPF prog-id=155 op=UNLOAD Mar 17 22:05:47.417000 audit[3765]: AVC avc: denied { bpf } for pid=3765 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.417000 audit[3765]: AVC avc: denied { bpf } for pid=3765 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.417000 audit[3765]: AVC avc: denied { perfmon } for pid=3765 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.417000 audit[3765]: AVC avc: denied { perfmon } for pid=3765 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.417000 audit[3765]: AVC avc: denied { perfmon } for pid=3765 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.417000 audit[3765]: AVC avc: denied { perfmon } for pid=3765 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.417000 audit[3765]: AVC avc: denied { perfmon } for pid=3765 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.417000 audit[3765]: AVC avc: denied { bpf } for pid=3765 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.417000 audit[3765]: AVC avc: denied { bpf } for pid=3765 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.417000 audit: BPF prog-id=156 op=LOAD Mar 17 22:05:47.417000 audit[3765]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffeaa8c6ff0 a2=74 a3=540051 items=0 ppid=3455 pid=3765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:47.417000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 22:05:47.419000 audit: BPF prog-id=156 op=UNLOAD Mar 17 22:05:47.419000 audit[3765]: AVC avc: denied { bpf } for pid=3765 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.419000 audit[3765]: AVC avc: denied { bpf } for pid=3765 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.419000 audit[3765]: AVC avc: denied { perfmon } for pid=3765 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.419000 audit[3765]: AVC avc: denied { perfmon } for pid=3765 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.419000 audit[3765]: AVC avc: denied { perfmon } for pid=3765 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.419000 audit[3765]: AVC avc: denied { perfmon } for pid=3765 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.419000 audit[3765]: AVC avc: denied { perfmon } for pid=3765 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.419000 audit[3765]: AVC avc: denied { bpf } for pid=3765 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.419000 audit[3765]: AVC avc: denied { bpf } for pid=3765 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.419000 audit: BPF prog-id=157 op=LOAD Mar 17 22:05:47.419000 audit[3765]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffeaa8c7020 a2=94 a3=2 items=0 ppid=3455 pid=3765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:47.419000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 22:05:47.420000 audit: BPF prog-id=157 op=UNLOAD Mar 17 22:05:47.484955 systemd-networkd[1031]: cali2317cd5da48: Link UP Mar 17 22:05:47.490797 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali2317cd5da48: link becomes ready Mar 17 22:05:47.491295 systemd-networkd[1031]: cali2317cd5da48: Gained carrier Mar 17 22:05:47.545062 env[1205]: 2025-03-17 22:05:47.109 [INFO][3714] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist Mar 17 22:05:47.545062 env[1205]: 2025-03-17 22:05:47.135 [INFO][3714] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {srv--zbif7.gb1.brightbox.com-k8s-coredns--668d6bf9bc--67bbv-eth0 coredns-668d6bf9bc- kube-system 630555ef-bf08-4b1a-91a4-a1ce8eafa62c 808 0 2025-03-17 22:05:04 +0000 UTC map[k8s-app:kube-dns pod-template-hash:668d6bf9bc projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s srv-zbif7.gb1.brightbox.com coredns-668d6bf9bc-67bbv eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali2317cd5da48 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="3e54fb9b9b8f5eb48f4eafa4b57401ec7b51f6298d3c1a147ffee5c595c957bb" Namespace="kube-system" Pod="coredns-668d6bf9bc-67bbv" WorkloadEndpoint="srv--zbif7.gb1.brightbox.com-k8s-coredns--668d6bf9bc--67bbv-" Mar 17 22:05:47.545062 env[1205]: 2025-03-17 22:05:47.136 [INFO][3714] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="3e54fb9b9b8f5eb48f4eafa4b57401ec7b51f6298d3c1a147ffee5c595c957bb" Namespace="kube-system" Pod="coredns-668d6bf9bc-67bbv" WorkloadEndpoint="srv--zbif7.gb1.brightbox.com-k8s-coredns--668d6bf9bc--67bbv-eth0" Mar 17 22:05:47.545062 env[1205]: 2025-03-17 22:05:47.270 [INFO][3731] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="3e54fb9b9b8f5eb48f4eafa4b57401ec7b51f6298d3c1a147ffee5c595c957bb" HandleID="k8s-pod-network.3e54fb9b9b8f5eb48f4eafa4b57401ec7b51f6298d3c1a147ffee5c595c957bb" Workload="srv--zbif7.gb1.brightbox.com-k8s-coredns--668d6bf9bc--67bbv-eth0" Mar 17 22:05:47.545062 env[1205]: 2025-03-17 22:05:47.296 [INFO][3731] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="3e54fb9b9b8f5eb48f4eafa4b57401ec7b51f6298d3c1a147ffee5c595c957bb" HandleID="k8s-pod-network.3e54fb9b9b8f5eb48f4eafa4b57401ec7b51f6298d3c1a147ffee5c595c957bb" Workload="srv--zbif7.gb1.brightbox.com-k8s-coredns--668d6bf9bc--67bbv-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0004225d0), Attrs:map[string]string{"namespace":"kube-system", "node":"srv-zbif7.gb1.brightbox.com", "pod":"coredns-668d6bf9bc-67bbv", "timestamp":"2025-03-17 22:05:47.270226777 +0000 UTC"}, Hostname:"srv-zbif7.gb1.brightbox.com", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Mar 17 22:05:47.545062 env[1205]: 2025-03-17 22:05:47.296 [INFO][3731] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 22:05:47.545062 env[1205]: 2025-03-17 22:05:47.296 [INFO][3731] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 22:05:47.545062 env[1205]: 2025-03-17 22:05:47.297 [INFO][3731] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'srv-zbif7.gb1.brightbox.com' Mar 17 22:05:47.545062 env[1205]: 2025-03-17 22:05:47.314 [INFO][3731] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.3e54fb9b9b8f5eb48f4eafa4b57401ec7b51f6298d3c1a147ffee5c595c957bb" host="srv-zbif7.gb1.brightbox.com" Mar 17 22:05:47.545062 env[1205]: 2025-03-17 22:05:47.394 [INFO][3731] ipam/ipam.go 372: Looking up existing affinities for host host="srv-zbif7.gb1.brightbox.com" Mar 17 22:05:47.545062 env[1205]: 2025-03-17 22:05:47.402 [INFO][3731] ipam/ipam.go 489: Trying affinity for 192.168.17.64/26 host="srv-zbif7.gb1.brightbox.com" Mar 17 22:05:47.545062 env[1205]: 2025-03-17 22:05:47.405 [INFO][3731] ipam/ipam.go 155: Attempting to load block cidr=192.168.17.64/26 host="srv-zbif7.gb1.brightbox.com" Mar 17 22:05:47.545062 env[1205]: 2025-03-17 22:05:47.417 [INFO][3731] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.17.64/26 host="srv-zbif7.gb1.brightbox.com" Mar 17 22:05:47.545062 env[1205]: 2025-03-17 22:05:47.417 [INFO][3731] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.17.64/26 handle="k8s-pod-network.3e54fb9b9b8f5eb48f4eafa4b57401ec7b51f6298d3c1a147ffee5c595c957bb" host="srv-zbif7.gb1.brightbox.com" Mar 17 22:05:47.545062 env[1205]: 2025-03-17 22:05:47.440 [INFO][3731] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.3e54fb9b9b8f5eb48f4eafa4b57401ec7b51f6298d3c1a147ffee5c595c957bb Mar 17 22:05:47.545062 env[1205]: 2025-03-17 22:05:47.451 [INFO][3731] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.17.64/26 handle="k8s-pod-network.3e54fb9b9b8f5eb48f4eafa4b57401ec7b51f6298d3c1a147ffee5c595c957bb" host="srv-zbif7.gb1.brightbox.com" Mar 17 22:05:47.545062 env[1205]: 2025-03-17 22:05:47.466 [INFO][3731] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.17.69/26] block=192.168.17.64/26 handle="k8s-pod-network.3e54fb9b9b8f5eb48f4eafa4b57401ec7b51f6298d3c1a147ffee5c595c957bb" host="srv-zbif7.gb1.brightbox.com" Mar 17 22:05:47.545062 env[1205]: 2025-03-17 22:05:47.467 [INFO][3731] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.17.69/26] handle="k8s-pod-network.3e54fb9b9b8f5eb48f4eafa4b57401ec7b51f6298d3c1a147ffee5c595c957bb" host="srv-zbif7.gb1.brightbox.com" Mar 17 22:05:47.545062 env[1205]: 2025-03-17 22:05:47.467 [INFO][3731] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 22:05:47.545062 env[1205]: 2025-03-17 22:05:47.467 [INFO][3731] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.17.69/26] IPv6=[] ContainerID="3e54fb9b9b8f5eb48f4eafa4b57401ec7b51f6298d3c1a147ffee5c595c957bb" HandleID="k8s-pod-network.3e54fb9b9b8f5eb48f4eafa4b57401ec7b51f6298d3c1a147ffee5c595c957bb" Workload="srv--zbif7.gb1.brightbox.com-k8s-coredns--668d6bf9bc--67bbv-eth0" Mar 17 22:05:47.546464 env[1205]: 2025-03-17 22:05:47.470 [INFO][3714] cni-plugin/k8s.go 386: Populated endpoint ContainerID="3e54fb9b9b8f5eb48f4eafa4b57401ec7b51f6298d3c1a147ffee5c595c957bb" Namespace="kube-system" Pod="coredns-668d6bf9bc-67bbv" WorkloadEndpoint="srv--zbif7.gb1.brightbox.com-k8s-coredns--668d6bf9bc--67bbv-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--zbif7.gb1.brightbox.com-k8s-coredns--668d6bf9bc--67bbv-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"630555ef-bf08-4b1a-91a4-a1ce8eafa62c", ResourceVersion:"808", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 22, 5, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-zbif7.gb1.brightbox.com", ContainerID:"", Pod:"coredns-668d6bf9bc-67bbv", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.17.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali2317cd5da48", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 22:05:47.546464 env[1205]: 2025-03-17 22:05:47.470 [INFO][3714] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.17.69/32] ContainerID="3e54fb9b9b8f5eb48f4eafa4b57401ec7b51f6298d3c1a147ffee5c595c957bb" Namespace="kube-system" Pod="coredns-668d6bf9bc-67bbv" WorkloadEndpoint="srv--zbif7.gb1.brightbox.com-k8s-coredns--668d6bf9bc--67bbv-eth0" Mar 17 22:05:47.546464 env[1205]: 2025-03-17 22:05:47.470 [INFO][3714] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali2317cd5da48 ContainerID="3e54fb9b9b8f5eb48f4eafa4b57401ec7b51f6298d3c1a147ffee5c595c957bb" Namespace="kube-system" Pod="coredns-668d6bf9bc-67bbv" WorkloadEndpoint="srv--zbif7.gb1.brightbox.com-k8s-coredns--668d6bf9bc--67bbv-eth0" Mar 17 22:05:47.546464 env[1205]: 2025-03-17 22:05:47.494 [INFO][3714] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="3e54fb9b9b8f5eb48f4eafa4b57401ec7b51f6298d3c1a147ffee5c595c957bb" Namespace="kube-system" Pod="coredns-668d6bf9bc-67bbv" WorkloadEndpoint="srv--zbif7.gb1.brightbox.com-k8s-coredns--668d6bf9bc--67bbv-eth0" Mar 17 22:05:47.546464 env[1205]: 2025-03-17 22:05:47.494 [INFO][3714] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="3e54fb9b9b8f5eb48f4eafa4b57401ec7b51f6298d3c1a147ffee5c595c957bb" Namespace="kube-system" Pod="coredns-668d6bf9bc-67bbv" WorkloadEndpoint="srv--zbif7.gb1.brightbox.com-k8s-coredns--668d6bf9bc--67bbv-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--zbif7.gb1.brightbox.com-k8s-coredns--668d6bf9bc--67bbv-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"630555ef-bf08-4b1a-91a4-a1ce8eafa62c", ResourceVersion:"808", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 22, 5, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-zbif7.gb1.brightbox.com", ContainerID:"3e54fb9b9b8f5eb48f4eafa4b57401ec7b51f6298d3c1a147ffee5c595c957bb", Pod:"coredns-668d6bf9bc-67bbv", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.17.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali2317cd5da48", MAC:"3a:5a:e3:75:d2:18", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 22:05:47.546464 env[1205]: 2025-03-17 22:05:47.540 [INFO][3714] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="3e54fb9b9b8f5eb48f4eafa4b57401ec7b51f6298d3c1a147ffee5c595c957bb" Namespace="kube-system" Pod="coredns-668d6bf9bc-67bbv" WorkloadEndpoint="srv--zbif7.gb1.brightbox.com-k8s-coredns--668d6bf9bc--67bbv-eth0" Mar 17 22:05:47.615684 env[1205]: time="2025-03-17T22:05:47.607438085Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Mar 17 22:05:47.615684 env[1205]: time="2025-03-17T22:05:47.609896655Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Mar 17 22:05:47.615684 env[1205]: time="2025-03-17T22:05:47.609919113Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Mar 17 22:05:47.615684 env[1205]: time="2025-03-17T22:05:47.610615480Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3e54fb9b9b8f5eb48f4eafa4b57401ec7b51f6298d3c1a147ffee5c595c957bb pid=3789 runtime=io.containerd.runc.v2 Mar 17 22:05:47.664730 systemd[1]: run-containerd-runc-k8s.io-3e54fb9b9b8f5eb48f4eafa4b57401ec7b51f6298d3c1a147ffee5c595c957bb-runc.7A4kmN.mount: Deactivated successfully. Mar 17 22:05:47.680101 systemd[1]: Started cri-containerd-3e54fb9b9b8f5eb48f4eafa4b57401ec7b51f6298d3c1a147ffee5c595c957bb.scope. Mar 17 22:05:47.733000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.733000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.733000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.733000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.733000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.733000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.733000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.733000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.733000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.733000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.733000 audit: BPF prog-id=158 op=LOAD Mar 17 22:05:47.735000 audit[3799]: AVC avc: denied { bpf } for pid=3799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.735000 audit[3799]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3789 pid=3799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:47.735000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365353466623962396238663565623438663465616661346235373430 Mar 17 22:05:47.736000 audit[3799]: AVC avc: denied { perfmon } for pid=3799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.736000 audit[3799]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3789 pid=3799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:47.736000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365353466623962396238663565623438663465616661346235373430 Mar 17 22:05:47.736000 audit[3799]: AVC avc: denied { bpf } for pid=3799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.736000 audit[3799]: AVC avc: denied { bpf } for pid=3799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.736000 audit[3799]: AVC avc: denied { bpf } for pid=3799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.736000 audit[3799]: AVC avc: denied { perfmon } for pid=3799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.736000 audit[3799]: AVC avc: denied { perfmon } for pid=3799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.736000 audit[3799]: AVC avc: denied { perfmon } for pid=3799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.736000 audit[3799]: AVC avc: denied { perfmon } for pid=3799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.736000 audit[3799]: AVC avc: denied { perfmon } for pid=3799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.736000 audit[3799]: AVC avc: denied { bpf } for pid=3799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.736000 audit[3799]: AVC avc: denied { bpf } for pid=3799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.736000 audit: BPF prog-id=159 op=LOAD Mar 17 22:05:47.736000 audit[3799]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001f4cf0 items=0 ppid=3789 pid=3799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:47.736000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365353466623962396238663565623438663465616661346235373430 Mar 17 22:05:47.737000 audit[3799]: AVC avc: denied { bpf } for pid=3799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.737000 audit[3799]: AVC avc: denied { bpf } for pid=3799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.737000 audit[3799]: AVC avc: denied { perfmon } for pid=3799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.737000 audit[3799]: AVC avc: denied { perfmon } for pid=3799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.737000 audit[3799]: AVC avc: denied { perfmon } for pid=3799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.737000 audit[3799]: AVC avc: denied { perfmon } for pid=3799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.737000 audit[3799]: AVC avc: denied { perfmon } for pid=3799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.737000 audit[3799]: AVC avc: denied { bpf } for pid=3799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.737000 audit[3799]: AVC avc: denied { bpf } for pid=3799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.737000 audit: BPF prog-id=160 op=LOAD Mar 17 22:05:47.737000 audit[3799]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001f4d38 items=0 ppid=3789 pid=3799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:47.737000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365353466623962396238663565623438663465616661346235373430 Mar 17 22:05:47.738000 audit: BPF prog-id=160 op=UNLOAD Mar 17 22:05:47.739000 audit: BPF prog-id=159 op=UNLOAD Mar 17 22:05:47.739000 audit[3799]: AVC avc: denied { bpf } for pid=3799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.739000 audit[3799]: AVC avc: denied { bpf } for pid=3799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.739000 audit[3799]: AVC avc: denied { bpf } for pid=3799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.739000 audit[3799]: AVC avc: denied { perfmon } for pid=3799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.739000 audit[3799]: AVC avc: denied { perfmon } for pid=3799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.739000 audit[3799]: AVC avc: denied { perfmon } for pid=3799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.739000 audit[3799]: AVC avc: denied { perfmon } for pid=3799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.739000 audit[3799]: AVC avc: denied { perfmon } for pid=3799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.739000 audit[3799]: AVC avc: denied { bpf } for pid=3799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.739000 audit[3799]: AVC avc: denied { bpf } for pid=3799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:47.739000 audit: BPF prog-id=161 op=LOAD Mar 17 22:05:47.739000 audit[3799]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001f5148 items=0 ppid=3789 pid=3799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:47.739000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365353466623962396238663565623438663465616661346235373430 Mar 17 22:05:47.856780 env[1205]: time="2025-03-17T22:05:47.856719978Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-67bbv,Uid:630555ef-bf08-4b1a-91a4-a1ce8eafa62c,Namespace:kube-system,Attempt:1,} returns sandbox id \"3e54fb9b9b8f5eb48f4eafa4b57401ec7b51f6298d3c1a147ffee5c595c957bb\"" Mar 17 22:05:47.869285 env[1205]: time="2025-03-17T22:05:47.869075837Z" level=info msg="CreateContainer within sandbox \"3e54fb9b9b8f5eb48f4eafa4b57401ec7b51f6298d3c1a147ffee5c595c957bb\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Mar 17 22:05:47.889693 sshd[3175]: Connection closed by invalid user hikvision 143.110.184.217 port 46908 [preauth] Mar 17 22:05:47.895460 systemd[1]: sshd@22-10.244.26.146:22-143.110.184.217:46908.service: Deactivated successfully. Mar 17 22:05:47.895000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.244.26.146:22-143.110.184.217:46908 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:05:47.932055 env[1205]: time="2025-03-17T22:05:47.931878274Z" level=info msg="CreateContainer within sandbox \"3e54fb9b9b8f5eb48f4eafa4b57401ec7b51f6298d3c1a147ffee5c595c957bb\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"c18a710abe3ad9025abaa1aad33b044f6635dcc0c4dc20dd266060476d360251\"" Mar 17 22:05:47.934764 env[1205]: time="2025-03-17T22:05:47.934727594Z" level=info msg="StartContainer for \"c18a710abe3ad9025abaa1aad33b044f6635dcc0c4dc20dd266060476d360251\"" Mar 17 22:05:47.995777 systemd[1]: Started cri-containerd-c18a710abe3ad9025abaa1aad33b044f6635dcc0c4dc20dd266060476d360251.scope. Mar 17 22:05:48.044000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.044000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.044000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.044000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.045000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.045000 audit: BPF prog-id=162 op=LOAD Mar 17 22:05:48.048000 audit[3840]: AVC avc: denied { bpf } for pid=3840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.048000 audit[3840]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3789 pid=3840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:48.048000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331386137313061626533616439303235616261613161616433336230 Mar 17 22:05:48.048000 audit[3840]: AVC avc: denied { perfmon } for pid=3840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.048000 audit[3840]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3789 pid=3840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:48.048000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331386137313061626533616439303235616261613161616433336230 Mar 17 22:05:48.048000 audit[3840]: AVC avc: denied { bpf } for pid=3840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.048000 audit[3840]: AVC avc: denied { bpf } for pid=3840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.048000 audit[3840]: AVC avc: denied { bpf } for pid=3840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.048000 audit[3840]: AVC avc: denied { perfmon } for pid=3840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.048000 audit[3840]: AVC avc: denied { perfmon } for pid=3840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.048000 audit[3840]: AVC avc: denied { perfmon } for pid=3840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.048000 audit[3840]: AVC avc: denied { perfmon } for pid=3840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.048000 audit[3840]: AVC avc: denied { perfmon } for pid=3840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.048000 audit[3840]: AVC avc: denied { bpf } for pid=3840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.048000 audit[3840]: AVC avc: denied { bpf } for pid=3840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.048000 audit: BPF prog-id=163 op=LOAD Mar 17 22:05:48.048000 audit[3840]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000364610 items=0 ppid=3789 pid=3840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:48.048000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331386137313061626533616439303235616261613161616433336230 Mar 17 22:05:48.049000 audit[3840]: AVC avc: denied { bpf } for pid=3840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.049000 audit[3840]: AVC avc: denied { bpf } for pid=3840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.049000 audit[3840]: AVC avc: denied { perfmon } for pid=3840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.049000 audit[3840]: AVC avc: denied { perfmon } for pid=3840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.049000 audit[3840]: AVC avc: denied { perfmon } for pid=3840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.049000 audit[3840]: AVC avc: denied { perfmon } for pid=3840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.049000 audit[3840]: AVC avc: denied { perfmon } for pid=3840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.049000 audit[3840]: AVC avc: denied { bpf } for pid=3840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.049000 audit[3840]: AVC avc: denied { bpf } for pid=3840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.049000 audit: BPF prog-id=164 op=LOAD Mar 17 22:05:48.049000 audit[3840]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000364658 items=0 ppid=3789 pid=3840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:48.049000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331386137313061626533616439303235616261613161616433336230 Mar 17 22:05:48.049000 audit: BPF prog-id=164 op=UNLOAD Mar 17 22:05:48.049000 audit: BPF prog-id=163 op=UNLOAD Mar 17 22:05:48.049000 audit[3840]: AVC avc: denied { bpf } for pid=3840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.049000 audit[3840]: AVC avc: denied { bpf } for pid=3840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.049000 audit[3840]: AVC avc: denied { bpf } for pid=3840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.049000 audit[3840]: AVC avc: denied { perfmon } for pid=3840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.049000 audit[3840]: AVC avc: denied { perfmon } for pid=3840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.049000 audit[3840]: AVC avc: denied { perfmon } for pid=3840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.049000 audit[3840]: AVC avc: denied { perfmon } for pid=3840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.049000 audit[3840]: AVC avc: denied { perfmon } for pid=3840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.049000 audit[3840]: AVC avc: denied { bpf } for pid=3840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.049000 audit[3840]: AVC avc: denied { bpf } for pid=3840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.049000 audit: BPF prog-id=165 op=LOAD Mar 17 22:05:48.049000 audit[3840]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000364a68 items=0 ppid=3789 pid=3840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:48.049000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331386137313061626533616439303235616261613161616433336230 Mar 17 22:05:48.079006 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3287610096.mount: Deactivated successfully. Mar 17 22:05:48.100803 env[1205]: time="2025-03-17T22:05:48.100744032Z" level=info msg="StartContainer for \"c18a710abe3ad9025abaa1aad33b044f6635dcc0c4dc20dd266060476d360251\" returns successfully" Mar 17 22:05:48.253826 systemd-networkd[1031]: cali394e9994a6f: Gained IPv6LL Mar 17 22:05:48.279564 env[1205]: time="2025-03-17T22:05:48.279390112Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 22:05:48.284794 env[1205]: time="2025-03-17T22:05:48.284702752Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 22:05:48.292126 env[1205]: time="2025-03-17T22:05:48.288241868Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 22:05:48.292126 env[1205]: time="2025-03-17T22:05:48.291317090Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:eaa7e01fb16b603c155a67b81f16992281db7f831684c7b2081d3434587a7ff3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 22:05:48.293307 env[1205]: time="2025-03-17T22:05:48.292414897Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\" returns image reference \"sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540\"" Mar 17 22:05:48.299130 env[1205]: time="2025-03-17T22:05:48.299039733Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\"" Mar 17 22:05:48.304963 env[1205]: time="2025-03-17T22:05:48.304682232Z" level=info msg="CreateContainer within sandbox \"0893610d76e3664367dde23252a185830b00cabcf4b587817760b37e2db5fc44\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Mar 17 22:05:48.347422 env[1205]: time="2025-03-17T22:05:48.347340940Z" level=info msg="CreateContainer within sandbox \"0893610d76e3664367dde23252a185830b00cabcf4b587817760b37e2db5fc44\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"be704637dcf6777d378e5e75988c04f113755eced08fd58c20c058f77a6bdbd4\"" Mar 17 22:05:48.348421 env[1205]: time="2025-03-17T22:05:48.348383372Z" level=info msg="StartContainer for \"be704637dcf6777d378e5e75988c04f113755eced08fd58c20c058f77a6bdbd4\"" Mar 17 22:05:48.352000 audit[3765]: AVC avc: denied { bpf } for pid=3765 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.352000 audit[3765]: AVC avc: denied { bpf } for pid=3765 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.352000 audit[3765]: AVC avc: denied { perfmon } for pid=3765 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.352000 audit[3765]: AVC avc: denied { perfmon } for pid=3765 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.352000 audit[3765]: AVC avc: denied { perfmon } for pid=3765 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.352000 audit[3765]: AVC avc: denied { perfmon } for pid=3765 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.352000 audit[3765]: AVC avc: denied { perfmon } for pid=3765 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.352000 audit[3765]: AVC avc: denied { bpf } for pid=3765 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.352000 audit[3765]: AVC avc: denied { bpf } for pid=3765 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.352000 audit: BPF prog-id=166 op=LOAD Mar 17 22:05:48.352000 audit[3765]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffeaa8c6ee0 a2=40 a3=1 items=0 ppid=3455 pid=3765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:48.352000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 22:05:48.353000 audit: BPF prog-id=166 op=UNLOAD Mar 17 22:05:48.353000 audit[3765]: AVC avc: denied { perfmon } for pid=3765 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.353000 audit[3765]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffeaa8c6fb0 a2=50 a3=7ffeaa8c7090 items=0 ppid=3455 pid=3765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:48.353000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 22:05:48.370000 audit[3765]: AVC avc: denied { bpf } for pid=3765 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.370000 audit[3765]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffeaa8c6ef0 a2=28 a3=0 items=0 ppid=3455 pid=3765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:48.370000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 22:05:48.371000 audit[3765]: AVC avc: denied { bpf } for pid=3765 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.371000 audit[3765]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffeaa8c6f20 a2=28 a3=0 items=0 ppid=3455 pid=3765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:48.371000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 22:05:48.371000 audit[3765]: AVC avc: denied { bpf } for pid=3765 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.371000 audit[3765]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffeaa8c6e30 a2=28 a3=0 items=0 ppid=3455 pid=3765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:48.371000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 22:05:48.371000 audit[3765]: AVC avc: denied { bpf } for pid=3765 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.371000 audit[3765]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffeaa8c6f40 a2=28 a3=0 items=0 ppid=3455 pid=3765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:48.371000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 22:05:48.371000 audit[3765]: AVC avc: denied { bpf } for pid=3765 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.371000 audit[3765]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffeaa8c6f20 a2=28 a3=0 items=0 ppid=3455 pid=3765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:48.371000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 22:05:48.371000 audit[3765]: AVC avc: denied { bpf } for pid=3765 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.371000 audit[3765]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffeaa8c6f10 a2=28 a3=0 items=0 ppid=3455 pid=3765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:48.371000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 22:05:48.371000 audit[3765]: AVC avc: denied { bpf } for pid=3765 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.371000 audit[3765]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffeaa8c6f40 a2=28 a3=0 items=0 ppid=3455 pid=3765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:48.371000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 22:05:48.371000 audit[3765]: AVC avc: denied { bpf } for pid=3765 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.371000 audit[3765]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffeaa8c6f20 a2=28 a3=0 items=0 ppid=3455 pid=3765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:48.371000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 22:05:48.371000 audit[3765]: AVC avc: denied { bpf } for pid=3765 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.371000 audit[3765]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffeaa8c6f40 a2=28 a3=0 items=0 ppid=3455 pid=3765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:48.371000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 22:05:48.371000 audit[3765]: AVC avc: denied { bpf } for pid=3765 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.371000 audit[3765]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffeaa8c6f10 a2=28 a3=0 items=0 ppid=3455 pid=3765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:48.371000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 22:05:48.371000 audit[3765]: AVC avc: denied { bpf } for pid=3765 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.371000 audit[3765]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffeaa8c6f80 a2=28 a3=0 items=0 ppid=3455 pid=3765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:48.371000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 22:05:48.372000 audit[3765]: AVC avc: denied { perfmon } for pid=3765 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.372000 audit[3765]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffeaa8c6d30 a2=50 a3=1 items=0 ppid=3455 pid=3765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:48.372000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 22:05:48.372000 audit[3765]: AVC avc: denied { bpf } for pid=3765 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.372000 audit[3765]: AVC avc: denied { bpf } for pid=3765 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.372000 audit[3765]: AVC avc: denied { perfmon } for pid=3765 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.372000 audit[3765]: AVC avc: denied { perfmon } for pid=3765 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.372000 audit[3765]: AVC avc: denied { perfmon } for pid=3765 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.372000 audit[3765]: AVC avc: denied { perfmon } for pid=3765 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.372000 audit[3765]: AVC avc: denied { perfmon } for pid=3765 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.372000 audit[3765]: AVC avc: denied { bpf } for pid=3765 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.372000 audit[3765]: AVC avc: denied { bpf } for pid=3765 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.372000 audit: BPF prog-id=167 op=LOAD Mar 17 22:05:48.372000 audit[3765]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffeaa8c6d30 a2=94 a3=5 items=0 ppid=3455 pid=3765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:48.372000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 22:05:48.372000 audit: BPF prog-id=167 op=UNLOAD Mar 17 22:05:48.372000 audit[3765]: AVC avc: denied { perfmon } for pid=3765 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.372000 audit[3765]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffeaa8c6de0 a2=50 a3=1 items=0 ppid=3455 pid=3765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:48.372000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 22:05:48.372000 audit[3765]: AVC avc: denied { bpf } for pid=3765 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.372000 audit[3765]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffeaa8c6f00 a2=4 a3=38 items=0 ppid=3455 pid=3765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:48.372000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 22:05:48.372000 audit[3765]: AVC avc: denied { bpf } for pid=3765 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.372000 audit[3765]: AVC avc: denied { bpf } for pid=3765 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.372000 audit[3765]: AVC avc: denied { perfmon } for pid=3765 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.372000 audit[3765]: AVC avc: denied { bpf } for pid=3765 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.372000 audit[3765]: AVC avc: denied { perfmon } for pid=3765 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.372000 audit[3765]: AVC avc: denied { perfmon } for pid=3765 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.372000 audit[3765]: AVC avc: denied { perfmon } for pid=3765 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.372000 audit[3765]: AVC avc: denied { perfmon } for pid=3765 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.372000 audit[3765]: AVC avc: denied { perfmon } for pid=3765 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.372000 audit[3765]: AVC avc: denied { bpf } for pid=3765 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.372000 audit[3765]: AVC avc: denied { confidentiality } for pid=3765 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 22:05:48.372000 audit[3765]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffeaa8c6f50 a2=94 a3=6 items=0 ppid=3455 pid=3765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:48.372000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 22:05:48.373000 audit[3765]: AVC avc: denied { bpf } for pid=3765 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.373000 audit[3765]: AVC avc: denied { bpf } for pid=3765 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.373000 audit[3765]: AVC avc: denied { perfmon } for pid=3765 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.373000 audit[3765]: AVC avc: denied { bpf } for pid=3765 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.373000 audit[3765]: AVC avc: denied { perfmon } for pid=3765 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.373000 audit[3765]: AVC avc: denied { perfmon } for pid=3765 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.373000 audit[3765]: AVC avc: denied { perfmon } for pid=3765 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.373000 audit[3765]: AVC avc: denied { perfmon } for pid=3765 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.373000 audit[3765]: AVC avc: denied { perfmon } for pid=3765 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.373000 audit[3765]: AVC avc: denied { bpf } for pid=3765 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.373000 audit[3765]: AVC avc: denied { confidentiality } for pid=3765 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 22:05:48.373000 audit[3765]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffeaa8c6700 a2=94 a3=83 items=0 ppid=3455 pid=3765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:48.373000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 22:05:48.373000 audit[3765]: AVC avc: denied { bpf } for pid=3765 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.373000 audit[3765]: AVC avc: denied { bpf } for pid=3765 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.373000 audit[3765]: AVC avc: denied { perfmon } for pid=3765 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.373000 audit[3765]: AVC avc: denied { bpf } for pid=3765 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.373000 audit[3765]: AVC avc: denied { perfmon } for pid=3765 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.373000 audit[3765]: AVC avc: denied { perfmon } for pid=3765 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.373000 audit[3765]: AVC avc: denied { perfmon } for pid=3765 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.373000 audit[3765]: AVC avc: denied { perfmon } for pid=3765 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.373000 audit[3765]: AVC avc: denied { perfmon } for pid=3765 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.373000 audit[3765]: AVC avc: denied { bpf } for pid=3765 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.373000 audit[3765]: AVC avc: denied { confidentiality } for pid=3765 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 22:05:48.373000 audit[3765]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffeaa8c6700 a2=94 a3=83 items=0 ppid=3455 pid=3765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:48.373000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 22:05:48.416724 systemd[1]: Started cri-containerd-be704637dcf6777d378e5e75988c04f113755eced08fd58c20c058f77a6bdbd4.scope. Mar 17 22:05:48.431788 systemd[1]: run-containerd-runc-k8s.io-be704637dcf6777d378e5e75988c04f113755eced08fd58c20c058f77a6bdbd4-runc.ir6LpA.mount: Deactivated successfully. Mar 17 22:05:48.484000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.484000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.484000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.484000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.484000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.484000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.484000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.484000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.484000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.484000 audit: BPF prog-id=168 op=LOAD Mar 17 22:05:48.484000 audit[3901]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc38283cc0 a2=98 a3=1999999999999999 items=0 ppid=3455 pid=3901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:48.484000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Mar 17 22:05:48.485000 audit: BPF prog-id=168 op=UNLOAD Mar 17 22:05:48.485000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.485000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.485000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.485000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.485000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.485000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.485000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.485000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.485000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.485000 audit: BPF prog-id=169 op=LOAD Mar 17 22:05:48.485000 audit[3901]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc38283ba0 a2=74 a3=ffff items=0 ppid=3455 pid=3901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:48.485000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Mar 17 22:05:48.485000 audit: BPF prog-id=169 op=UNLOAD Mar 17 22:05:48.485000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.485000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.485000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.485000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.485000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.485000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.485000 audit[3901]: AVC avc: denied { perfmon } for pid=3901 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.485000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.485000 audit[3901]: AVC avc: denied { bpf } for pid=3901 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.485000 audit: BPF prog-id=170 op=LOAD Mar 17 22:05:48.485000 audit[3901]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc38283be0 a2=40 a3=7ffc38283dc0 items=0 ppid=3455 pid=3901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:48.485000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Mar 17 22:05:48.488000 audit: BPF prog-id=170 op=UNLOAD Mar 17 22:05:48.500000 audit[3852]: AVC avc: denied { getattr } for pid=3852 comm="coredns" path="cgroup:[4026532413]" dev="nsfs" ino=4026532413 scontext=system_u:system_r:svirt_lxc_net_t:s0:c427,c839 tcontext=system_u:object_r:nsfs_t:s0 tclass=file permissive=0 Mar 17 22:05:48.500000 audit[3852]: SYSCALL arch=c000003e syscall=262 success=no exit=-13 a0=ffffffffffffff9c a1=c000058798 a2=c000127148 a3=0 items=0 ppid=3789 pid=3852 auid=4294967295 uid=65532 gid=65532 euid=65532 suid=65532 fsuid=65532 egid=65532 sgid=65532 fsgid=65532 tty=(none) ses=4294967295 comm="coredns" exe="/coredns" subj=system_u:system_r:svirt_lxc_net_t:s0:c427,c839 key=(null) Mar 17 22:05:48.500000 audit: PROCTITLE proctitle=2F636F7265646E73002D636F6E66002F6574632F636F7265646E732F436F726566696C65 Mar 17 22:05:48.515000 audit[3882]: AVC avc: denied { perfmon } for pid=3882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.515000 audit[3882]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7ff03ee1a138 items=0 ppid=3327 pid=3882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:48.515000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265373034363337646366363737376433373865356537353938386330 Mar 17 22:05:48.516000 audit[3882]: AVC avc: denied { bpf } for pid=3882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.516000 audit[3882]: AVC avc: denied { bpf } for pid=3882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.516000 audit[3882]: AVC avc: denied { bpf } for pid=3882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.516000 audit[3882]: AVC avc: denied { perfmon } for pid=3882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.516000 audit[3882]: AVC avc: denied { perfmon } for pid=3882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.516000 audit[3882]: AVC avc: denied { perfmon } for pid=3882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.516000 audit[3882]: AVC avc: denied { perfmon } for pid=3882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.516000 audit[3882]: AVC avc: denied { perfmon } for pid=3882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.516000 audit[3882]: AVC avc: denied { bpf } for pid=3882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.516000 audit[3882]: AVC avc: denied { bpf } for pid=3882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.516000 audit: BPF prog-id=171 op=LOAD Mar 17 22:05:48.516000 audit[3882]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0003b81c8 items=0 ppid=3327 pid=3882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:48.516000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265373034363337646366363737376433373865356537353938386330 Mar 17 22:05:48.517000 audit[3882]: AVC avc: denied { bpf } for pid=3882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.517000 audit[3882]: AVC avc: denied { bpf } for pid=3882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.517000 audit[3882]: AVC avc: denied { perfmon } for pid=3882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.517000 audit[3882]: AVC avc: denied { perfmon } for pid=3882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.517000 audit[3882]: AVC avc: denied { perfmon } for pid=3882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.517000 audit[3882]: AVC avc: denied { perfmon } for pid=3882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.517000 audit[3882]: AVC avc: denied { perfmon } for pid=3882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.517000 audit[3882]: AVC avc: denied { bpf } for pid=3882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.517000 audit[3882]: AVC avc: denied { bpf } for pid=3882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.517000 audit: BPF prog-id=172 op=LOAD Mar 17 22:05:48.517000 audit[3882]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0003b8218 items=0 ppid=3327 pid=3882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:48.517000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265373034363337646366363737376433373865356537353938386330 Mar 17 22:05:48.518000 audit: BPF prog-id=172 op=UNLOAD Mar 17 22:05:48.518000 audit: BPF prog-id=171 op=UNLOAD Mar 17 22:05:48.518000 audit[3882]: AVC avc: denied { bpf } for pid=3882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.518000 audit[3882]: AVC avc: denied { bpf } for pid=3882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.518000 audit[3882]: AVC avc: denied { bpf } for pid=3882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.518000 audit[3882]: AVC avc: denied { perfmon } for pid=3882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.518000 audit[3882]: AVC avc: denied { perfmon } for pid=3882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.518000 audit[3882]: AVC avc: denied { perfmon } for pid=3882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.518000 audit[3882]: AVC avc: denied { perfmon } for pid=3882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.518000 audit[3882]: AVC avc: denied { perfmon } for pid=3882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.518000 audit[3882]: AVC avc: denied { bpf } for pid=3882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.518000 audit[3882]: AVC avc: denied { bpf } for pid=3882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.518000 audit: BPF prog-id=173 op=LOAD Mar 17 22:05:48.518000 audit[3882]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0003b82a8 items=0 ppid=3327 pid=3882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:48.518000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265373034363337646366363737376433373865356537353938386330 Mar 17 22:05:48.571851 env[1205]: time="2025-03-17T22:05:48.571780974Z" level=info msg="StartContainer for \"be704637dcf6777d378e5e75988c04f113755eced08fd58c20c058f77a6bdbd4\" returns successfully" Mar 17 22:05:48.717861 systemd-networkd[1031]: vxlan.calico: Link UP Mar 17 22:05:48.717872 systemd-networkd[1031]: vxlan.calico: Gained carrier Mar 17 22:05:48.814000 audit[3940]: AVC avc: denied { bpf } for pid=3940 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.814000 audit[3940]: AVC avc: denied { bpf } for pid=3940 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.814000 audit[3940]: AVC avc: denied { perfmon } for pid=3940 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.814000 audit[3940]: AVC avc: denied { perfmon } for pid=3940 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.814000 audit[3940]: AVC avc: denied { perfmon } for pid=3940 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.814000 audit[3940]: AVC avc: denied { perfmon } for pid=3940 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.814000 audit[3940]: AVC avc: denied { perfmon } for pid=3940 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.814000 audit[3940]: AVC avc: denied { bpf } for pid=3940 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.814000 audit[3940]: AVC avc: denied { bpf } for pid=3940 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.814000 audit: BPF prog-id=174 op=LOAD Mar 17 22:05:48.814000 audit[3940]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcfac97a90 a2=98 a3=100 items=0 ppid=3455 pid=3940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:48.814000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 22:05:48.814000 audit: BPF prog-id=174 op=UNLOAD Mar 17 22:05:48.822829 systemd-networkd[1031]: calib727b1bc4f5: Gained IPv6LL Mar 17 22:05:48.851000 audit[3940]: AVC avc: denied { bpf } for pid=3940 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.851000 audit[3940]: AVC avc: denied { bpf } for pid=3940 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.851000 audit[3940]: AVC avc: denied { perfmon } for pid=3940 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.851000 audit[3940]: AVC avc: denied { perfmon } for pid=3940 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.851000 audit[3940]: AVC avc: denied { perfmon } for pid=3940 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.851000 audit[3940]: AVC avc: denied { perfmon } for pid=3940 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.851000 audit[3940]: AVC avc: denied { perfmon } for pid=3940 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.851000 audit[3940]: AVC avc: denied { bpf } for pid=3940 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.851000 audit[3940]: AVC avc: denied { bpf } for pid=3940 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.851000 audit: BPF prog-id=175 op=LOAD Mar 17 22:05:48.851000 audit[3940]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcfac978a0 a2=74 a3=540051 items=0 ppid=3455 pid=3940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:48.851000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 22:05:48.851000 audit: BPF prog-id=175 op=UNLOAD Mar 17 22:05:48.851000 audit[3940]: AVC avc: denied { bpf } for pid=3940 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.851000 audit[3940]: AVC avc: denied { bpf } for pid=3940 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.851000 audit[3940]: AVC avc: denied { perfmon } for pid=3940 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.851000 audit[3940]: AVC avc: denied { perfmon } for pid=3940 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.851000 audit[3940]: AVC avc: denied { perfmon } for pid=3940 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.851000 audit[3940]: AVC avc: denied { perfmon } for pid=3940 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.851000 audit[3940]: AVC avc: denied { perfmon } for pid=3940 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.851000 audit[3940]: AVC avc: denied { bpf } for pid=3940 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.851000 audit[3940]: AVC avc: denied { bpf } for pid=3940 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.851000 audit: BPF prog-id=176 op=LOAD Mar 17 22:05:48.851000 audit[3940]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcfac978d0 a2=94 a3=2 items=0 ppid=3455 pid=3940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:48.851000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 22:05:48.851000 audit: BPF prog-id=176 op=UNLOAD Mar 17 22:05:48.851000 audit[3940]: AVC avc: denied { bpf } for pid=3940 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.851000 audit[3940]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffcfac977a0 a2=28 a3=0 items=0 ppid=3455 pid=3940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:48.851000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 22:05:48.851000 audit[3940]: AVC avc: denied { bpf } for pid=3940 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.851000 audit[3940]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcfac977d0 a2=28 a3=0 items=0 ppid=3455 pid=3940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:48.851000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 22:05:48.852000 audit[3940]: AVC avc: denied { bpf } for pid=3940 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.852000 audit[3940]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcfac976e0 a2=28 a3=0 items=0 ppid=3455 pid=3940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:48.852000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 22:05:48.852000 audit[3940]: AVC avc: denied { bpf } for pid=3940 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.852000 audit[3940]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffcfac977f0 a2=28 a3=0 items=0 ppid=3455 pid=3940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:48.852000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 22:05:48.852000 audit[3940]: AVC avc: denied { bpf } for pid=3940 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.852000 audit[3940]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffcfac977d0 a2=28 a3=0 items=0 ppid=3455 pid=3940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:48.852000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 22:05:48.852000 audit[3940]: AVC avc: denied { bpf } for pid=3940 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.852000 audit[3940]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffcfac977c0 a2=28 a3=0 items=0 ppid=3455 pid=3940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:48.852000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 22:05:48.852000 audit[3940]: AVC avc: denied { bpf } for pid=3940 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.852000 audit[3940]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffcfac977f0 a2=28 a3=0 items=0 ppid=3455 pid=3940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:48.852000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 22:05:48.852000 audit[3940]: AVC avc: denied { bpf } for pid=3940 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.852000 audit[3940]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcfac977d0 a2=28 a3=0 items=0 ppid=3455 pid=3940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:48.852000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 22:05:48.852000 audit[3940]: AVC avc: denied { bpf } for pid=3940 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.852000 audit[3940]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcfac977f0 a2=28 a3=0 items=0 ppid=3455 pid=3940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:48.852000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 22:05:48.852000 audit[3940]: AVC avc: denied { bpf } for pid=3940 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.852000 audit[3940]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcfac977c0 a2=28 a3=0 items=0 ppid=3455 pid=3940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:48.852000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 22:05:48.852000 audit[3940]: AVC avc: denied { bpf } for pid=3940 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.852000 audit[3940]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffcfac97830 a2=28 a3=0 items=0 ppid=3455 pid=3940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:48.852000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 22:05:48.852000 audit[3940]: AVC avc: denied { bpf } for pid=3940 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.852000 audit[3940]: AVC avc: denied { bpf } for pid=3940 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.852000 audit[3940]: AVC avc: denied { perfmon } for pid=3940 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.852000 audit[3940]: AVC avc: denied { perfmon } for pid=3940 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.852000 audit[3940]: AVC avc: denied { perfmon } for pid=3940 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.852000 audit[3940]: AVC avc: denied { perfmon } for pid=3940 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.852000 audit[3940]: AVC avc: denied { perfmon } for pid=3940 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.852000 audit[3940]: AVC avc: denied { bpf } for pid=3940 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.852000 audit[3940]: AVC avc: denied { bpf } for pid=3940 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.852000 audit: BPF prog-id=177 op=LOAD Mar 17 22:05:48.852000 audit[3940]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffcfac976a0 a2=40 a3=0 items=0 ppid=3455 pid=3940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:48.852000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 22:05:48.852000 audit: BPF prog-id=177 op=UNLOAD Mar 17 22:05:48.854000 audit[3940]: AVC avc: denied { bpf } for pid=3940 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.854000 audit[3940]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffcfac97690 a2=50 a3=2800 items=0 ppid=3455 pid=3940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:48.854000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 22:05:48.854000 audit[3940]: AVC avc: denied { bpf } for pid=3940 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.854000 audit[3940]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffcfac97690 a2=50 a3=2800 items=0 ppid=3455 pid=3940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:48.854000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 22:05:48.854000 audit[3940]: AVC avc: denied { bpf } for pid=3940 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.854000 audit[3940]: AVC avc: denied { bpf } for pid=3940 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.854000 audit[3940]: AVC avc: denied { bpf } for pid=3940 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.854000 audit[3940]: AVC avc: denied { perfmon } for pid=3940 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.854000 audit[3940]: AVC avc: denied { perfmon } for pid=3940 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.854000 audit[3940]: AVC avc: denied { perfmon } for pid=3940 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.854000 audit[3940]: AVC avc: denied { perfmon } for pid=3940 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.854000 audit[3940]: AVC avc: denied { perfmon } for pid=3940 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.854000 audit[3940]: AVC avc: denied { bpf } for pid=3940 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.854000 audit[3940]: AVC avc: denied { bpf } for pid=3940 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.854000 audit: BPF prog-id=178 op=LOAD Mar 17 22:05:48.854000 audit[3940]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffcfac96eb0 a2=94 a3=2 items=0 ppid=3455 pid=3940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:48.854000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 22:05:48.854000 audit: BPF prog-id=178 op=UNLOAD Mar 17 22:05:48.854000 audit[3940]: AVC avc: denied { bpf } for pid=3940 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.854000 audit[3940]: AVC avc: denied { bpf } for pid=3940 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.854000 audit[3940]: AVC avc: denied { bpf } for pid=3940 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.854000 audit[3940]: AVC avc: denied { perfmon } for pid=3940 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.854000 audit[3940]: AVC avc: denied { perfmon } for pid=3940 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.854000 audit[3940]: AVC avc: denied { perfmon } for pid=3940 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.854000 audit[3940]: AVC avc: denied { perfmon } for pid=3940 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.854000 audit[3940]: AVC avc: denied { perfmon } for pid=3940 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.854000 audit[3940]: AVC avc: denied { bpf } for pid=3940 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.854000 audit[3940]: AVC avc: denied { bpf } for pid=3940 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.854000 audit: BPF prog-id=179 op=LOAD Mar 17 22:05:48.854000 audit[3940]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffcfac96fb0 a2=94 a3=2d items=0 ppid=3455 pid=3940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:48.854000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 22:05:48.867000 audit[3954]: AVC avc: denied { bpf } for pid=3954 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.867000 audit[3954]: AVC avc: denied { bpf } for pid=3954 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.867000 audit[3954]: AVC avc: denied { perfmon } for pid=3954 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.867000 audit[3954]: AVC avc: denied { perfmon } for pid=3954 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.867000 audit[3954]: AVC avc: denied { perfmon } for pid=3954 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.867000 audit[3954]: AVC avc: denied { perfmon } for pid=3954 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.867000 audit[3954]: AVC avc: denied { perfmon } for pid=3954 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.867000 audit[3954]: AVC avc: denied { bpf } for pid=3954 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.867000 audit[3954]: AVC avc: denied { bpf } for pid=3954 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.867000 audit: BPF prog-id=180 op=LOAD Mar 17 22:05:48.867000 audit[3954]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe8f8e1840 a2=98 a3=0 items=0 ppid=3455 pid=3954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:48.867000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 22:05:48.867000 audit: BPF prog-id=180 op=UNLOAD Mar 17 22:05:48.868000 audit[3954]: AVC avc: denied { bpf } for pid=3954 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.868000 audit[3954]: AVC avc: denied { bpf } for pid=3954 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.868000 audit[3954]: AVC avc: denied { perfmon } for pid=3954 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.868000 audit[3954]: AVC avc: denied { perfmon } for pid=3954 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.868000 audit[3954]: AVC avc: denied { perfmon } for pid=3954 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.868000 audit[3954]: AVC avc: denied { perfmon } for pid=3954 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.868000 audit[3954]: AVC avc: denied { perfmon } for pid=3954 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.868000 audit[3954]: AVC avc: denied { bpf } for pid=3954 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.868000 audit[3954]: AVC avc: denied { bpf } for pid=3954 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.868000 audit: BPF prog-id=181 op=LOAD Mar 17 22:05:48.868000 audit[3954]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe8f8e1620 a2=74 a3=540051 items=0 ppid=3455 pid=3954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:48.868000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 22:05:48.868000 audit: BPF prog-id=181 op=UNLOAD Mar 17 22:05:48.868000 audit[3954]: AVC avc: denied { bpf } for pid=3954 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.868000 audit[3954]: AVC avc: denied { bpf } for pid=3954 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.868000 audit[3954]: AVC avc: denied { perfmon } for pid=3954 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.868000 audit[3954]: AVC avc: denied { perfmon } for pid=3954 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.868000 audit[3954]: AVC avc: denied { perfmon } for pid=3954 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.868000 audit[3954]: AVC avc: denied { perfmon } for pid=3954 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.868000 audit[3954]: AVC avc: denied { perfmon } for pid=3954 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.868000 audit[3954]: AVC avc: denied { bpf } for pid=3954 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.868000 audit[3954]: AVC avc: denied { bpf } for pid=3954 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:48.868000 audit: BPF prog-id=182 op=LOAD Mar 17 22:05:48.868000 audit[3954]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe8f8e1650 a2=94 a3=2 items=0 ppid=3455 pid=3954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:48.868000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 22:05:48.868000 audit: BPF prog-id=182 op=UNLOAD Mar 17 22:05:48.950962 systemd-networkd[1031]: cali2317cd5da48: Gained IPv6LL Mar 17 22:05:48.992855 kubelet[2045]: I0317 22:05:48.992745 2045 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-668d6bf9bc-67bbv" podStartSLOduration=44.992711425 podStartE2EDuration="44.992711425s" podCreationTimestamp="2025-03-17 22:05:04 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-03-17 22:05:48.956092784 +0000 UTC m=+48.632467297" watchObservedRunningTime="2025-03-17 22:05:48.992711425 +0000 UTC m=+48.669085940" Mar 17 22:05:49.078000 audit[3956]: NETFILTER_CFG table=filter:97 family=2 entries=13 op=nft_register_rule pid=3956 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 22:05:49.078000 audit[3956]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7fff423fecb0 a2=0 a3=7fff423fec9c items=0 ppid=2206 pid=3956 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:49.078000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 22:05:49.085000 audit[3956]: NETFILTER_CFG table=nat:98 family=2 entries=35 op=nft_register_chain pid=3956 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 22:05:49.085000 audit[3956]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7fff423fecb0 a2=0 a3=7fff423fec9c items=0 ppid=2206 pid=3956 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:49.085000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 22:05:49.121000 audit[3958]: NETFILTER_CFG table=filter:99 family=2 entries=10 op=nft_register_rule pid=3958 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 22:05:49.121000 audit[3958]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffde049bc40 a2=0 a3=7ffde049bc2c items=0 ppid=2206 pid=3958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:49.121000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 22:05:49.126000 audit[3954]: AVC avc: denied { bpf } for pid=3954 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:49.126000 audit[3954]: AVC avc: denied { bpf } for pid=3954 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:49.126000 audit[3954]: AVC avc: denied { perfmon } for pid=3954 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:49.126000 audit[3954]: AVC avc: denied { perfmon } for pid=3954 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:49.126000 audit[3954]: AVC avc: denied { perfmon } for pid=3954 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:49.126000 audit[3954]: AVC avc: denied { perfmon } for pid=3954 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:49.126000 audit[3954]: AVC avc: denied { perfmon } for pid=3954 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:49.126000 audit[3954]: AVC avc: denied { bpf } for pid=3954 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:49.126000 audit[3954]: AVC avc: denied { bpf } for pid=3954 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:49.126000 audit: BPF prog-id=183 op=LOAD Mar 17 22:05:49.126000 audit[3954]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe8f8e1510 a2=40 a3=1 items=0 ppid=3455 pid=3954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:49.126000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 22:05:49.127000 audit: BPF prog-id=183 op=UNLOAD Mar 17 22:05:49.127000 audit[3954]: AVC avc: denied { perfmon } for pid=3954 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:49.127000 audit[3954]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffe8f8e15e0 a2=50 a3=7ffe8f8e16c0 items=0 ppid=3455 pid=3954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:49.127000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 22:05:49.128000 audit[3958]: NETFILTER_CFG table=nat:100 family=2 entries=20 op=nft_register_rule pid=3958 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 22:05:49.128000 audit[3958]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffde049bc40 a2=0 a3=7ffde049bc2c items=0 ppid=2206 pid=3958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:49.128000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 22:05:49.139000 audit[3954]: AVC avc: denied { bpf } for pid=3954 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:49.139000 audit[3954]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe8f8e1520 a2=28 a3=0 items=0 ppid=3455 pid=3954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:49.139000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 22:05:49.139000 audit[3954]: AVC avc: denied { bpf } for pid=3954 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:49.139000 audit[3954]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe8f8e1550 a2=28 a3=0 items=0 ppid=3455 pid=3954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:49.139000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 22:05:49.140000 audit[3954]: AVC avc: denied { bpf } for pid=3954 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:49.140000 audit[3954]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe8f8e1460 a2=28 a3=0 items=0 ppid=3455 pid=3954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:49.140000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 22:05:49.140000 audit[3954]: AVC avc: denied { bpf } for pid=3954 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:49.140000 audit[3954]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe8f8e1570 a2=28 a3=0 items=0 ppid=3455 pid=3954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:49.140000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 22:05:49.140000 audit[3954]: AVC avc: denied { bpf } for pid=3954 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:49.140000 audit[3954]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe8f8e1550 a2=28 a3=0 items=0 ppid=3455 pid=3954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:49.140000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 22:05:49.140000 audit[3954]: AVC avc: denied { bpf } for pid=3954 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:49.140000 audit[3954]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe8f8e1540 a2=28 a3=0 items=0 ppid=3455 pid=3954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:49.140000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 22:05:49.140000 audit[3954]: AVC avc: denied { bpf } for pid=3954 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:49.140000 audit[3954]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe8f8e1570 a2=28 a3=0 items=0 ppid=3455 pid=3954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:49.140000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 22:05:49.140000 audit[3954]: AVC avc: denied { bpf } for pid=3954 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:49.140000 audit[3954]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe8f8e1550 a2=28 a3=0 items=0 ppid=3455 pid=3954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:49.140000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 22:05:49.140000 audit[3954]: AVC avc: denied { bpf } for pid=3954 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:49.140000 audit[3954]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe8f8e1570 a2=28 a3=0 items=0 ppid=3455 pid=3954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:49.140000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 22:05:49.140000 audit[3954]: AVC avc: denied { bpf } for pid=3954 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:49.140000 audit[3954]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe8f8e1540 a2=28 a3=0 items=0 ppid=3455 pid=3954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:49.140000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 22:05:49.146000 audit[3954]: AVC avc: denied { bpf } for pid=3954 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:49.146000 audit[3954]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe8f8e15b0 a2=28 a3=0 items=0 ppid=3455 pid=3954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:49.146000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 22:05:49.146000 audit[3954]: AVC avc: denied { perfmon } for pid=3954 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:49.146000 audit[3954]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe8f8e1360 a2=50 a3=1 items=0 ppid=3455 pid=3954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:49.146000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 22:05:49.146000 audit[3954]: AVC avc: denied { bpf } for pid=3954 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:49.146000 audit[3954]: AVC avc: denied { bpf } for pid=3954 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:49.146000 audit[3954]: AVC avc: denied { perfmon } for pid=3954 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:49.146000 audit[3954]: AVC avc: denied { perfmon } for pid=3954 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:49.146000 audit[3954]: AVC avc: denied { perfmon } for pid=3954 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:49.146000 audit[3954]: AVC avc: denied { perfmon } for pid=3954 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:49.146000 audit[3954]: AVC avc: denied { perfmon } for pid=3954 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:49.146000 audit[3954]: AVC avc: denied { bpf } for pid=3954 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:49.146000 audit[3954]: AVC avc: denied { bpf } for pid=3954 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:49.146000 audit: BPF prog-id=184 op=LOAD Mar 17 22:05:49.146000 audit[3954]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe8f8e1360 a2=94 a3=5 items=0 ppid=3455 pid=3954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:49.146000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 22:05:49.146000 audit: BPF prog-id=184 op=UNLOAD Mar 17 22:05:49.146000 audit[3954]: AVC avc: denied { perfmon } for pid=3954 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:49.146000 audit[3954]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe8f8e1410 a2=50 a3=1 items=0 ppid=3455 pid=3954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:49.146000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 22:05:49.146000 audit[3954]: AVC avc: denied { bpf } for pid=3954 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:49.146000 audit[3954]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffe8f8e1530 a2=4 a3=38 items=0 ppid=3455 pid=3954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:49.146000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 22:05:49.146000 audit[3954]: AVC avc: denied { bpf } for pid=3954 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:49.146000 audit[3954]: AVC avc: denied { bpf } for pid=3954 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:49.146000 audit[3954]: AVC avc: denied { perfmon } for pid=3954 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:49.146000 audit[3954]: AVC avc: denied { bpf } for pid=3954 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:49.146000 audit[3954]: AVC avc: denied { perfmon } for pid=3954 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:49.146000 audit[3954]: AVC avc: denied { perfmon } for pid=3954 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:49.146000 audit[3954]: AVC avc: denied { perfmon } for pid=3954 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:49.146000 audit[3954]: AVC avc: denied { perfmon } for pid=3954 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:49.146000 audit[3954]: AVC avc: denied { perfmon } for pid=3954 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:49.146000 audit[3954]: AVC avc: denied { bpf } for pid=3954 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:49.146000 audit[3954]: AVC avc: denied { confidentiality } for pid=3954 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 22:05:49.146000 audit[3954]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe8f8e1580 a2=94 a3=6 items=0 ppid=3455 pid=3954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:49.146000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 22:05:49.147000 audit[3954]: AVC avc: denied { bpf } for pid=3954 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:49.147000 audit[3954]: AVC avc: denied { bpf } for pid=3954 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:49.147000 audit[3954]: AVC avc: denied { perfmon } for pid=3954 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:49.147000 audit[3954]: AVC avc: denied { bpf } for pid=3954 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:49.147000 audit[3954]: AVC avc: denied { perfmon } for pid=3954 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:49.147000 audit[3954]: AVC avc: denied { perfmon } for pid=3954 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:49.147000 audit[3954]: AVC avc: denied { perfmon } for pid=3954 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:49.147000 audit[3954]: AVC avc: denied { perfmon } for pid=3954 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:49.147000 audit[3954]: AVC avc: denied { perfmon } for pid=3954 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:49.147000 audit[3954]: AVC avc: denied { bpf } for pid=3954 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:49.147000 audit[3954]: AVC avc: denied { confidentiality } for pid=3954 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 22:05:49.147000 audit[3954]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe8f8e0d30 a2=94 a3=83 items=0 ppid=3455 pid=3954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:49.147000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 22:05:49.147000 audit[3954]: AVC avc: denied { bpf } for pid=3954 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:49.147000 audit[3954]: AVC avc: denied { bpf } for pid=3954 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:49.147000 audit[3954]: AVC avc: denied { perfmon } for pid=3954 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:49.147000 audit[3954]: AVC avc: denied { bpf } for pid=3954 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:49.147000 audit[3954]: AVC avc: denied { perfmon } for pid=3954 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:49.147000 audit[3954]: AVC avc: denied { perfmon } for pid=3954 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:49.147000 audit[3954]: AVC avc: denied { perfmon } for pid=3954 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:49.147000 audit[3954]: AVC avc: denied { perfmon } for pid=3954 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:49.147000 audit[3954]: AVC avc: denied { perfmon } for pid=3954 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:49.147000 audit[3954]: AVC avc: denied { bpf } for pid=3954 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:49.147000 audit[3954]: AVC avc: denied { confidentiality } for pid=3954 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 22:05:49.147000 audit[3954]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe8f8e0d30 a2=94 a3=83 items=0 ppid=3455 pid=3954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:49.147000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 22:05:49.148000 audit[3954]: AVC avc: denied { bpf } for pid=3954 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:49.148000 audit[3954]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe8f8e2770 a2=10 a3=f1f00800 items=0 ppid=3455 pid=3954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:49.148000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 22:05:49.148000 audit[3954]: AVC avc: denied { bpf } for pid=3954 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:49.148000 audit[3954]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe8f8e2610 a2=10 a3=3 items=0 ppid=3455 pid=3954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:49.148000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 22:05:49.148000 audit[3954]: AVC avc: denied { bpf } for pid=3954 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:49.148000 audit[3954]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe8f8e25b0 a2=10 a3=3 items=0 ppid=3455 pid=3954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:49.148000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 22:05:49.148000 audit[3954]: AVC avc: denied { bpf } for pid=3954 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:49.148000 audit[3954]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe8f8e25b0 a2=10 a3=7 items=0 ppid=3455 pid=3954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:49.148000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 22:05:49.168000 audit: BPF prog-id=179 op=UNLOAD Mar 17 22:05:49.168000 audit[1031]: SYSCALL arch=c000003e syscall=257 success=yes exit=22 a0=ffffff9c a1=55f87971f680 a2=800c2 a3=180 items=4 ppid=1 pid=1031 auid=4294967295 uid=244 gid=244 euid=244 suid=244 fsuid=244 egid=244 sgid=244 fsgid=244 tty=(none) ses=4294967295 comm="systemd-network" exe="/usr/lib/systemd/systemd-networkd" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:49.168000 audit: CWD cwd="/" Mar 17 22:05:49.168000 audit: PATH item=0 name=(null) inode=678 dev=00:17 mode=040755 ouid=244 ogid=244 rdev=00:00 obj=system_u:object_r:systemd_networkd_runtime_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 22:05:49.168000 audit: PATH item=1 name=(null) nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 22:05:49.168000 audit: PATH item=2 name=(null) inode=678 dev=00:17 mode=040755 ouid=244 ogid=244 rdev=00:00 obj=system_u:object_r:systemd_networkd_runtime_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 22:05:49.168000 audit: PATH item=3 name=(null) inode=3131 dev=00:17 mode=0100600 ouid=244 ogid=244 rdev=00:00 obj=system_u:object_r:systemd_networkd_runtime_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 22:05:49.168000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-networkd" Mar 17 22:05:49.294000 audit[3989]: NETFILTER_CFG table=mangle:101 family=2 entries=16 op=nft_register_chain pid=3989 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Mar 17 22:05:49.294000 audit[3989]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffef3f4fde0 a2=0 a3=7ffef3f4fdcc items=0 ppid=3455 pid=3989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:49.294000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Mar 17 22:05:49.314000 audit[3988]: NETFILTER_CFG table=raw:102 family=2 entries=21 op=nft_register_chain pid=3988 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Mar 17 22:05:49.314000 audit[3988]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffc6d368110 a2=0 a3=7ffc6d3680fc items=0 ppid=3455 pid=3988 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:49.314000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Mar 17 22:05:49.324000 audit[3990]: NETFILTER_CFG table=nat:103 family=2 entries=15 op=nft_register_chain pid=3990 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Mar 17 22:05:49.324000 audit[3990]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7fff54f80cc0 a2=0 a3=7fff54f80cac items=0 ppid=3455 pid=3990 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:49.324000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Mar 17 22:05:49.327000 audit[3992]: NETFILTER_CFG table=filter:104 family=2 entries=187 op=nft_register_chain pid=3992 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Mar 17 22:05:49.327000 audit[3992]: SYSCALL arch=c000003e syscall=46 success=yes exit=108788 a0=3 a1=7ffd02660cd0 a2=0 a3=7ffd02660cbc items=0 ppid=3455 pid=3992 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:49.327000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Mar 17 22:05:49.913043 systemd-networkd[1031]: vxlan.calico: Gained IPv6LL Mar 17 22:05:53.325100 env[1205]: time="2025-03-17T22:05:53.324844282Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 22:05:53.328514 env[1205]: time="2025-03-17T22:05:53.328409363Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 22:05:53.332106 env[1205]: time="2025-03-17T22:05:53.331958230Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 22:05:53.335859 env[1205]: time="2025-03-17T22:05:53.335707826Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:b8c43e264fe52e0c327b0bf3ac882a0224b33bdd7f4ff58a74242da7d9b00486,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 22:05:53.336708 env[1205]: time="2025-03-17T22:05:53.336667617Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\" returns image reference \"sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70\"" Mar 17 22:05:53.339860 env[1205]: time="2025-03-17T22:05:53.339811411Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.1\"" Mar 17 22:05:53.346061 env[1205]: time="2025-03-17T22:05:53.345850146Z" level=info msg="CreateContainer within sandbox \"c2e60aeef56d051dd5d8df49f29315b96f7b595d0a0efd6487fb1f7452307136\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Mar 17 22:05:53.371081 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3310560115.mount: Deactivated successfully. Mar 17 22:05:53.381800 env[1205]: time="2025-03-17T22:05:53.381714290Z" level=info msg="CreateContainer within sandbox \"c2e60aeef56d051dd5d8df49f29315b96f7b595d0a0efd6487fb1f7452307136\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"f04997d7743f7f228e9d79a7f2051068ed68c501d00a3eb2b9d75c5c40a83be3\"" Mar 17 22:05:53.386130 env[1205]: time="2025-03-17T22:05:53.384904420Z" level=info msg="StartContainer for \"f04997d7743f7f228e9d79a7f2051068ed68c501d00a3eb2b9d75c5c40a83be3\"" Mar 17 22:05:53.441000 audit[1929]: AVC avc: denied { watch } for pid=1929 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526382 scontext=system_u:system_r:svirt_lxc_net_t:s0:c616,c864 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 22:05:53.447046 kernel: kauditd_printk_skb: 764 callbacks suppressed Mar 17 22:05:53.447217 kernel: audit: type=1400 audit(1742249153.441:1274): avc: denied { watch } for pid=1929 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526382 scontext=system_u:system_r:svirt_lxc_net_t:s0:c616,c864 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 22:05:53.441000 audit[1929]: AVC avc: denied { watch } for pid=1929 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526376 scontext=system_u:system_r:svirt_lxc_net_t:s0:c616,c864 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 22:05:53.471094 kernel: audit: type=1400 audit(1742249153.441:1275): avc: denied { watch } for pid=1929 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526376 scontext=system_u:system_r:svirt_lxc_net_t:s0:c616,c864 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 22:05:53.471279 kernel: audit: type=1300 audit(1742249153.441:1274): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00190f2f0 a2=fc6 a3=0 items=0 ppid=1787 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c616,c864 key=(null) Mar 17 22:05:53.441000 audit[1929]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00190f2f0 a2=fc6 a3=0 items=0 ppid=1787 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c616,c864 key=(null) Mar 17 22:05:53.462870 systemd[1]: Started cri-containerd-f04997d7743f7f228e9d79a7f2051068ed68c501d00a3eb2b9d75c5c40a83be3.scope. Mar 17 22:05:53.441000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Mar 17 22:05:53.484599 kernel: audit: type=1327 audit(1742249153.441:1274): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Mar 17 22:05:53.441000 audit[1929]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001712ea0 a2=fc6 a3=0 items=0 ppid=1787 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c616,c864 key=(null) Mar 17 22:05:53.441000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Mar 17 22:05:53.502535 kernel: audit: type=1300 audit(1742249153.441:1275): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001712ea0 a2=fc6 a3=0 items=0 ppid=1787 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c616,c864 key=(null) Mar 17 22:05:53.502725 kernel: audit: type=1327 audit(1742249153.441:1275): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Mar 17 22:05:53.535000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:53.535000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:53.546750 kernel: audit: type=1400 audit(1742249153.535:1276): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:53.546875 kernel: audit: type=1400 audit(1742249153.535:1277): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:53.535000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:53.552230 kernel: audit: type=1400 audit(1742249153.535:1278): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:53.552488 kernel: audit: type=1400 audit(1742249153.535:1279): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:53.535000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:53.535000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:53.535000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:53.535000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:53.535000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:53.535000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:53.546000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:53.546000 audit: BPF prog-id=185 op=LOAD Mar 17 22:05:53.547000 audit[4010]: AVC avc: denied { bpf } for pid=4010 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:53.547000 audit[4010]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000149c48 a2=10 a3=1c items=0 ppid=3388 pid=4010 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:53.547000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630343939376437373433663766323238653964373961376632303531 Mar 17 22:05:53.547000 audit[4010]: AVC avc: denied { perfmon } for pid=4010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:53.547000 audit[4010]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001496b0 a2=3c a3=8 items=0 ppid=3388 pid=4010 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:53.547000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630343939376437373433663766323238653964373961376632303531 Mar 17 22:05:53.547000 audit[4010]: AVC avc: denied { bpf } for pid=4010 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:53.547000 audit[4010]: AVC avc: denied { bpf } for pid=4010 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:53.547000 audit[4010]: AVC avc: denied { bpf } for pid=4010 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:53.547000 audit[4010]: AVC avc: denied { perfmon } for pid=4010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:53.547000 audit[4010]: AVC avc: denied { perfmon } for pid=4010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:53.547000 audit[4010]: AVC avc: denied { perfmon } for pid=4010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:53.547000 audit[4010]: AVC avc: denied { perfmon } for pid=4010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:53.547000 audit[4010]: AVC avc: denied { perfmon } for pid=4010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:53.547000 audit[4010]: AVC avc: denied { bpf } for pid=4010 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:53.547000 audit[4010]: AVC avc: denied { bpf } for pid=4010 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:53.547000 audit: BPF prog-id=186 op=LOAD Mar 17 22:05:53.547000 audit[4010]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001499d8 a2=78 a3=c000320f80 items=0 ppid=3388 pid=4010 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:53.547000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630343939376437373433663766323238653964373961376632303531 Mar 17 22:05:53.559000 audit[4010]: AVC avc: denied { bpf } for pid=4010 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:53.559000 audit[4010]: AVC avc: denied { bpf } for pid=4010 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:53.559000 audit[4010]: AVC avc: denied { perfmon } for pid=4010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:53.559000 audit[4010]: AVC avc: denied { perfmon } for pid=4010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:53.559000 audit[4010]: AVC avc: denied { perfmon } for pid=4010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:53.559000 audit[4010]: AVC avc: denied { perfmon } for pid=4010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:53.559000 audit[4010]: AVC avc: denied { perfmon } for pid=4010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:53.559000 audit[4010]: AVC avc: denied { bpf } for pid=4010 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:53.559000 audit[4010]: AVC avc: denied { bpf } for pid=4010 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:53.559000 audit: BPF prog-id=187 op=LOAD Mar 17 22:05:53.559000 audit[4010]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000149770 a2=78 a3=c000320fc8 items=0 ppid=3388 pid=4010 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:53.559000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630343939376437373433663766323238653964373961376632303531 Mar 17 22:05:53.559000 audit: BPF prog-id=187 op=UNLOAD Mar 17 22:05:53.559000 audit: BPF prog-id=186 op=UNLOAD Mar 17 22:05:53.559000 audit[4010]: AVC avc: denied { bpf } for pid=4010 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:53.559000 audit[4010]: AVC avc: denied { bpf } for pid=4010 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:53.559000 audit[4010]: AVC avc: denied { bpf } for pid=4010 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:53.559000 audit[4010]: AVC avc: denied { perfmon } for pid=4010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:53.559000 audit[4010]: AVC avc: denied { perfmon } for pid=4010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:53.559000 audit[4010]: AVC avc: denied { perfmon } for pid=4010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:53.559000 audit[4010]: AVC avc: denied { perfmon } for pid=4010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:53.559000 audit[4010]: AVC avc: denied { perfmon } for pid=4010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:53.559000 audit[4010]: AVC avc: denied { bpf } for pid=4010 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:53.559000 audit[4010]: AVC avc: denied { bpf } for pid=4010 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:53.559000 audit: BPF prog-id=188 op=LOAD Mar 17 22:05:53.559000 audit[4010]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000149c30 a2=78 a3=c0003213d8 items=0 ppid=3388 pid=4010 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:53.559000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630343939376437373433663766323238653964373961376632303531 Mar 17 22:05:53.656448 env[1205]: time="2025-03-17T22:05:53.654346561Z" level=info msg="StartContainer for \"f04997d7743f7f228e9d79a7f2051068ed68c501d00a3eb2b9d75c5c40a83be3\" returns successfully" Mar 17 22:05:54.006696 kubelet[2045]: I0317 22:05:54.006425 2045 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-9cf959fb7-wc2pd" podStartSLOduration=33.837001651 podStartE2EDuration="41.006328424s" podCreationTimestamp="2025-03-17 22:05:13 +0000 UTC" firstStartedPulling="2025-03-17 22:05:46.169495515 +0000 UTC m=+45.845870022" lastFinishedPulling="2025-03-17 22:05:53.338822289 +0000 UTC m=+53.015196795" observedRunningTime="2025-03-17 22:05:53.999178808 +0000 UTC m=+53.675553322" watchObservedRunningTime="2025-03-17 22:05:54.006328424 +0000 UTC m=+53.682702933" Mar 17 22:05:54.052000 audit[4044]: NETFILTER_CFG table=filter:105 family=2 entries=10 op=nft_register_rule pid=4044 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 22:05:54.052000 audit[4044]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffff574e7f0 a2=0 a3=7ffff574e7dc items=0 ppid=2206 pid=4044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:54.052000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 22:05:54.057000 audit[4044]: NETFILTER_CFG table=nat:106 family=2 entries=20 op=nft_register_rule pid=4044 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 22:05:54.057000 audit[4044]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffff574e7f0 a2=0 a3=7ffff574e7dc items=0 ppid=2206 pid=4044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:54.057000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 22:05:54.668610 systemd[1]: Started sshd@23-10.244.26.146:22-143.110.184.217:56974.service. Mar 17 22:05:54.669000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.244.26.146:22-143.110.184.217:56974 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:05:54.784000 audit[4022]: AVC avc: denied { watch } for pid=4022 comm="apiserver" path="/calico-apiserver-certs/..2025_03_17_22_05_30.2614453132/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c159,c447 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c159,c447 tclass=file permissive=0 Mar 17 22:05:54.784000 audit[4022]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000a9ea60 a2=fc6 a3=0 items=0 ppid=3388 pid=4022 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c159,c447 key=(null) Mar 17 22:05:54.784000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Mar 17 22:05:54.985872 kubelet[2045]: I0317 22:05:54.985288 2045 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Mar 17 22:05:55.544000 audit[4054]: USER_AUTH pid=4054 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=143.110.184.217 addr=143.110.184.217 terminal=ssh res=failed' Mar 17 22:05:55.544817 sshd[4054]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.110.184.217 user=root Mar 17 22:05:55.776000 audit[1916]: AVC avc: denied { watch } for pid=1916 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526376 scontext=system_u:system_r:svirt_lxc_net_t:s0:c529,c961 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 22:05:55.776000 audit[1916]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=68 a1=c0077ab340 a2=fc6 a3=0 items=0 ppid=1740 pid=1916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c529,c961 key=(null) Mar 17 22:05:55.776000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E32362E313436002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Mar 17 22:05:55.777000 audit[1916]: AVC avc: denied { watch } for pid=1916 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=526378 scontext=system_u:system_r:svirt_lxc_net_t:s0:c529,c961 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 22:05:55.777000 audit[1916]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c0062c5ce0 a2=fc6 a3=0 items=0 ppid=1740 pid=1916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c529,c961 key=(null) Mar 17 22:05:55.777000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E32362E313436002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Mar 17 22:05:55.780000 audit[1916]: AVC avc: denied { watch } for pid=1916 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526382 scontext=system_u:system_r:svirt_lxc_net_t:s0:c529,c961 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 22:05:55.780000 audit[1916]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=68 a1=c0064ccc30 a2=fc6 a3=0 items=0 ppid=1740 pid=1916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c529,c961 key=(null) Mar 17 22:05:55.780000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E32362E313436002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Mar 17 22:05:55.781000 audit[1916]: AVC avc: denied { watch } for pid=1916 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526382 scontext=system_u:system_r:svirt_lxc_net_t:s0:c529,c961 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 22:05:55.781000 audit[1916]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=68 a1=c0064ccc90 a2=fc6 a3=0 items=0 ppid=1740 pid=1916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c529,c961 key=(null) Mar 17 22:05:55.781000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E32362E313436002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Mar 17 22:05:55.781000 audit[1916]: AVC avc: denied { watch } for pid=1916 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526376 scontext=system_u:system_r:svirt_lxc_net_t:s0:c529,c961 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 22:05:55.781000 audit[1916]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=68 a1=c0077ab3a0 a2=fc6 a3=0 items=0 ppid=1740 pid=1916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c529,c961 key=(null) Mar 17 22:05:55.781000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E32362E313436002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Mar 17 22:05:55.786000 audit[1916]: AVC avc: denied { watch } for pid=1916 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=526384 scontext=system_u:system_r:svirt_lxc_net_t:s0:c529,c961 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 22:05:55.786000 audit[1916]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=68 a1=c0069dc030 a2=fc6 a3=0 items=0 ppid=1740 pid=1916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c529,c961 key=(null) Mar 17 22:05:55.786000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E32362E313436002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Mar 17 22:05:56.595738 env[1205]: time="2025-03-17T22:05:56.595636764Z" level=info msg="StopPodSandbox for \"86a1255a92a9fb66a96092bff74e8535b80b4ff61972ceec62ee6fd36ddf9498\"" Mar 17 22:05:56.943216 env[1205]: 2025-03-17 22:05:56.838 [INFO][4071] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="86a1255a92a9fb66a96092bff74e8535b80b4ff61972ceec62ee6fd36ddf9498" Mar 17 22:05:56.943216 env[1205]: 2025-03-17 22:05:56.840 [INFO][4071] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="86a1255a92a9fb66a96092bff74e8535b80b4ff61972ceec62ee6fd36ddf9498" iface="eth0" netns="/var/run/netns/cni-1aa4ce65-c49a-b7c9-d027-e67d1ce16f40" Mar 17 22:05:56.943216 env[1205]: 2025-03-17 22:05:56.841 [INFO][4071] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="86a1255a92a9fb66a96092bff74e8535b80b4ff61972ceec62ee6fd36ddf9498" iface="eth0" netns="/var/run/netns/cni-1aa4ce65-c49a-b7c9-d027-e67d1ce16f40" Mar 17 22:05:56.943216 env[1205]: 2025-03-17 22:05:56.842 [INFO][4071] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="86a1255a92a9fb66a96092bff74e8535b80b4ff61972ceec62ee6fd36ddf9498" iface="eth0" netns="/var/run/netns/cni-1aa4ce65-c49a-b7c9-d027-e67d1ce16f40" Mar 17 22:05:56.943216 env[1205]: 2025-03-17 22:05:56.842 [INFO][4071] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="86a1255a92a9fb66a96092bff74e8535b80b4ff61972ceec62ee6fd36ddf9498" Mar 17 22:05:56.943216 env[1205]: 2025-03-17 22:05:56.842 [INFO][4071] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="86a1255a92a9fb66a96092bff74e8535b80b4ff61972ceec62ee6fd36ddf9498" Mar 17 22:05:56.943216 env[1205]: 2025-03-17 22:05:56.915 [INFO][4077] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="86a1255a92a9fb66a96092bff74e8535b80b4ff61972ceec62ee6fd36ddf9498" HandleID="k8s-pod-network.86a1255a92a9fb66a96092bff74e8535b80b4ff61972ceec62ee6fd36ddf9498" Workload="srv--zbif7.gb1.brightbox.com-k8s-coredns--668d6bf9bc--hksfn-eth0" Mar 17 22:05:56.943216 env[1205]: 2025-03-17 22:05:56.917 [INFO][4077] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 22:05:56.943216 env[1205]: 2025-03-17 22:05:56.917 [INFO][4077] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 22:05:56.943216 env[1205]: 2025-03-17 22:05:56.935 [WARNING][4077] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="86a1255a92a9fb66a96092bff74e8535b80b4ff61972ceec62ee6fd36ddf9498" HandleID="k8s-pod-network.86a1255a92a9fb66a96092bff74e8535b80b4ff61972ceec62ee6fd36ddf9498" Workload="srv--zbif7.gb1.brightbox.com-k8s-coredns--668d6bf9bc--hksfn-eth0" Mar 17 22:05:56.943216 env[1205]: 2025-03-17 22:05:56.935 [INFO][4077] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="86a1255a92a9fb66a96092bff74e8535b80b4ff61972ceec62ee6fd36ddf9498" HandleID="k8s-pod-network.86a1255a92a9fb66a96092bff74e8535b80b4ff61972ceec62ee6fd36ddf9498" Workload="srv--zbif7.gb1.brightbox.com-k8s-coredns--668d6bf9bc--hksfn-eth0" Mar 17 22:05:56.943216 env[1205]: 2025-03-17 22:05:56.937 [INFO][4077] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 22:05:56.943216 env[1205]: 2025-03-17 22:05:56.941 [INFO][4071] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="86a1255a92a9fb66a96092bff74e8535b80b4ff61972ceec62ee6fd36ddf9498" Mar 17 22:05:56.950462 env[1205]: time="2025-03-17T22:05:56.947426520Z" level=info msg="TearDown network for sandbox \"86a1255a92a9fb66a96092bff74e8535b80b4ff61972ceec62ee6fd36ddf9498\" successfully" Mar 17 22:05:56.950462 env[1205]: time="2025-03-17T22:05:56.947696201Z" level=info msg="StopPodSandbox for \"86a1255a92a9fb66a96092bff74e8535b80b4ff61972ceec62ee6fd36ddf9498\" returns successfully" Mar 17 22:05:56.950462 env[1205]: time="2025-03-17T22:05:56.949756273Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-hksfn,Uid:a82f42e7-3e9b-43f9-92e0-df21d942a638,Namespace:kube-system,Attempt:1,}" Mar 17 22:05:56.947086 systemd[1]: run-netns-cni\x2d1aa4ce65\x2dc49a\x2db7c9\x2dd027\x2de67d1ce16f40.mount: Deactivated successfully. Mar 17 22:05:57.058731 env[1205]: time="2025-03-17T22:05:57.058669605Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 22:05:57.063079 env[1205]: time="2025-03-17T22:05:57.062976506Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6331715a2ae96b18a770a395cac108321d108e445e08b616e5bc9fbd1f9c21da,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 22:05:57.068165 env[1205]: time="2025-03-17T22:05:57.068032485Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 22:05:57.073224 env[1205]: time="2025-03-17T22:05:57.073163679Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:1072d6a98167a14ca361e9ce757733f9bae36d1f1c6a9621ea10934b6b1e10d9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 22:05:57.074158 env[1205]: time="2025-03-17T22:05:57.074115084Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.1\" returns image reference \"sha256:6331715a2ae96b18a770a395cac108321d108e445e08b616e5bc9fbd1f9c21da\"" Mar 17 22:05:57.077910 env[1205]: time="2025-03-17T22:05:57.077803592Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\"" Mar 17 22:05:57.219751 env[1205]: time="2025-03-17T22:05:57.218475882Z" level=info msg="CreateContainer within sandbox \"a9506756dd2c6d8172cef2e734f8497688fa20b88e335776a7112a23e73fce38\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Mar 17 22:05:57.246540 env[1205]: time="2025-03-17T22:05:57.246458262Z" level=info msg="CreateContainer within sandbox \"a9506756dd2c6d8172cef2e734f8497688fa20b88e335776a7112a23e73fce38\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"b6b143babede96ab4cc2a0d50e25a04455503651f3bcbafebe0dec63df22d948\"" Mar 17 22:05:57.250050 env[1205]: time="2025-03-17T22:05:57.249984258Z" level=info msg="StartContainer for \"b6b143babede96ab4cc2a0d50e25a04455503651f3bcbafebe0dec63df22d948\"" Mar 17 22:05:57.297154 systemd[1]: Started cri-containerd-b6b143babede96ab4cc2a0d50e25a04455503651f3bcbafebe0dec63df22d948.scope. Mar 17 22:05:57.346537 sshd[4054]: Failed password for root from 143.110.184.217 port 56974 ssh2 Mar 17 22:05:57.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.364000 audit: BPF prog-id=189 op=LOAD Mar 17 22:05:57.368000 audit[4112]: AVC avc: denied { bpf } for pid=4112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.368000 audit[4112]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3625 pid=4112 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:57.368000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236623134336261626564653936616234636332613064353065323561 Mar 17 22:05:57.369000 audit[4112]: AVC avc: denied { perfmon } for pid=4112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.369000 audit[4112]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3625 pid=4112 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:57.369000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236623134336261626564653936616234636332613064353065323561 Mar 17 22:05:57.369000 audit[4112]: AVC avc: denied { bpf } for pid=4112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.369000 audit[4112]: AVC avc: denied { bpf } for pid=4112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.369000 audit[4112]: AVC avc: denied { bpf } for pid=4112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.369000 audit[4112]: AVC avc: denied { perfmon } for pid=4112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.369000 audit[4112]: AVC avc: denied { perfmon } for pid=4112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.369000 audit[4112]: AVC avc: denied { perfmon } for pid=4112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.369000 audit[4112]: AVC avc: denied { perfmon } for pid=4112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.369000 audit[4112]: AVC avc: denied { perfmon } for pid=4112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.369000 audit[4112]: AVC avc: denied { bpf } for pid=4112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.369000 audit[4112]: AVC avc: denied { bpf } for pid=4112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.369000 audit: BPF prog-id=190 op=LOAD Mar 17 22:05:57.369000 audit[4112]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000354980 items=0 ppid=3625 pid=4112 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:57.369000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236623134336261626564653936616234636332613064353065323561 Mar 17 22:05:57.371000 audit[4112]: AVC avc: denied { bpf } for pid=4112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.371000 audit[4112]: AVC avc: denied { bpf } for pid=4112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.371000 audit[4112]: AVC avc: denied { perfmon } for pid=4112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.371000 audit[4112]: AVC avc: denied { perfmon } for pid=4112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.371000 audit[4112]: AVC avc: denied { perfmon } for pid=4112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.371000 audit[4112]: AVC avc: denied { perfmon } for pid=4112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.371000 audit[4112]: AVC avc: denied { perfmon } for pid=4112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.371000 audit[4112]: AVC avc: denied { bpf } for pid=4112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.371000 audit[4112]: AVC avc: denied { bpf } for pid=4112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.371000 audit: BPF prog-id=191 op=LOAD Mar 17 22:05:57.371000 audit[4112]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003549c8 items=0 ppid=3625 pid=4112 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:57.371000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236623134336261626564653936616234636332613064353065323561 Mar 17 22:05:57.371000 audit: BPF prog-id=191 op=UNLOAD Mar 17 22:05:57.371000 audit: BPF prog-id=190 op=UNLOAD Mar 17 22:05:57.372000 audit[4112]: AVC avc: denied { bpf } for pid=4112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.372000 audit[4112]: AVC avc: denied { bpf } for pid=4112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.372000 audit[4112]: AVC avc: denied { bpf } for pid=4112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.372000 audit[4112]: AVC avc: denied { perfmon } for pid=4112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.372000 audit[4112]: AVC avc: denied { perfmon } for pid=4112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.372000 audit[4112]: AVC avc: denied { perfmon } for pid=4112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.372000 audit[4112]: AVC avc: denied { perfmon } for pid=4112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.372000 audit[4112]: AVC avc: denied { perfmon } for pid=4112 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.372000 audit[4112]: AVC avc: denied { bpf } for pid=4112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.372000 audit[4112]: AVC avc: denied { bpf } for pid=4112 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.372000 audit: BPF prog-id=192 op=LOAD Mar 17 22:05:57.372000 audit[4112]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000354dd8 items=0 ppid=3625 pid=4112 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:57.372000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236623134336261626564653936616234636332613064353065323561 Mar 17 22:05:57.401386 systemd-networkd[1031]: califdf1ac91348: Link UP Mar 17 22:05:57.415146 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Mar 17 22:05:57.415328 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): califdf1ac91348: link becomes ready Mar 17 22:05:57.413757 systemd-networkd[1031]: califdf1ac91348: Gained carrier Mar 17 22:05:57.455629 env[1205]: 2025-03-17 22:05:57.054 [INFO][4083] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {srv--zbif7.gb1.brightbox.com-k8s-coredns--668d6bf9bc--hksfn-eth0 coredns-668d6bf9bc- kube-system a82f42e7-3e9b-43f9-92e0-df21d942a638 857 0 2025-03-17 22:05:04 +0000 UTC map[k8s-app:kube-dns pod-template-hash:668d6bf9bc projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s srv-zbif7.gb1.brightbox.com coredns-668d6bf9bc-hksfn eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] califdf1ac91348 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="cbf73e6dcb57c0f5a9b23280ade2e64dd56509c963009ccd9fcd6ddc05957630" Namespace="kube-system" Pod="coredns-668d6bf9bc-hksfn" WorkloadEndpoint="srv--zbif7.gb1.brightbox.com-k8s-coredns--668d6bf9bc--hksfn-" Mar 17 22:05:57.455629 env[1205]: 2025-03-17 22:05:57.054 [INFO][4083] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="cbf73e6dcb57c0f5a9b23280ade2e64dd56509c963009ccd9fcd6ddc05957630" Namespace="kube-system" Pod="coredns-668d6bf9bc-hksfn" WorkloadEndpoint="srv--zbif7.gb1.brightbox.com-k8s-coredns--668d6bf9bc--hksfn-eth0" Mar 17 22:05:57.455629 env[1205]: 2025-03-17 22:05:57.211 [INFO][4096] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="cbf73e6dcb57c0f5a9b23280ade2e64dd56509c963009ccd9fcd6ddc05957630" HandleID="k8s-pod-network.cbf73e6dcb57c0f5a9b23280ade2e64dd56509c963009ccd9fcd6ddc05957630" Workload="srv--zbif7.gb1.brightbox.com-k8s-coredns--668d6bf9bc--hksfn-eth0" Mar 17 22:05:57.455629 env[1205]: 2025-03-17 22:05:57.242 [INFO][4096] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="cbf73e6dcb57c0f5a9b23280ade2e64dd56509c963009ccd9fcd6ddc05957630" HandleID="k8s-pod-network.cbf73e6dcb57c0f5a9b23280ade2e64dd56509c963009ccd9fcd6ddc05957630" Workload="srv--zbif7.gb1.brightbox.com-k8s-coredns--668d6bf9bc--hksfn-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003116a0), Attrs:map[string]string{"namespace":"kube-system", "node":"srv-zbif7.gb1.brightbox.com", "pod":"coredns-668d6bf9bc-hksfn", "timestamp":"2025-03-17 22:05:57.211293909 +0000 UTC"}, Hostname:"srv-zbif7.gb1.brightbox.com", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Mar 17 22:05:57.455629 env[1205]: 2025-03-17 22:05:57.242 [INFO][4096] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 22:05:57.455629 env[1205]: 2025-03-17 22:05:57.243 [INFO][4096] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 22:05:57.455629 env[1205]: 2025-03-17 22:05:57.243 [INFO][4096] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'srv-zbif7.gb1.brightbox.com' Mar 17 22:05:57.455629 env[1205]: 2025-03-17 22:05:57.257 [INFO][4096] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.cbf73e6dcb57c0f5a9b23280ade2e64dd56509c963009ccd9fcd6ddc05957630" host="srv-zbif7.gb1.brightbox.com" Mar 17 22:05:57.455629 env[1205]: 2025-03-17 22:05:57.334 [INFO][4096] ipam/ipam.go 372: Looking up existing affinities for host host="srv-zbif7.gb1.brightbox.com" Mar 17 22:05:57.455629 env[1205]: 2025-03-17 22:05:57.345 [INFO][4096] ipam/ipam.go 489: Trying affinity for 192.168.17.64/26 host="srv-zbif7.gb1.brightbox.com" Mar 17 22:05:57.455629 env[1205]: 2025-03-17 22:05:57.349 [INFO][4096] ipam/ipam.go 155: Attempting to load block cidr=192.168.17.64/26 host="srv-zbif7.gb1.brightbox.com" Mar 17 22:05:57.455629 env[1205]: 2025-03-17 22:05:57.354 [INFO][4096] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.17.64/26 host="srv-zbif7.gb1.brightbox.com" Mar 17 22:05:57.455629 env[1205]: 2025-03-17 22:05:57.354 [INFO][4096] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.17.64/26 handle="k8s-pod-network.cbf73e6dcb57c0f5a9b23280ade2e64dd56509c963009ccd9fcd6ddc05957630" host="srv-zbif7.gb1.brightbox.com" Mar 17 22:05:57.455629 env[1205]: 2025-03-17 22:05:57.357 [INFO][4096] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.cbf73e6dcb57c0f5a9b23280ade2e64dd56509c963009ccd9fcd6ddc05957630 Mar 17 22:05:57.455629 env[1205]: 2025-03-17 22:05:57.367 [INFO][4096] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.17.64/26 handle="k8s-pod-network.cbf73e6dcb57c0f5a9b23280ade2e64dd56509c963009ccd9fcd6ddc05957630" host="srv-zbif7.gb1.brightbox.com" Mar 17 22:05:57.455629 env[1205]: 2025-03-17 22:05:57.386 [INFO][4096] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.17.70/26] block=192.168.17.64/26 handle="k8s-pod-network.cbf73e6dcb57c0f5a9b23280ade2e64dd56509c963009ccd9fcd6ddc05957630" host="srv-zbif7.gb1.brightbox.com" Mar 17 22:05:57.455629 env[1205]: 2025-03-17 22:05:57.386 [INFO][4096] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.17.70/26] handle="k8s-pod-network.cbf73e6dcb57c0f5a9b23280ade2e64dd56509c963009ccd9fcd6ddc05957630" host="srv-zbif7.gb1.brightbox.com" Mar 17 22:05:57.455629 env[1205]: 2025-03-17 22:05:57.386 [INFO][4096] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 22:05:57.455629 env[1205]: 2025-03-17 22:05:57.386 [INFO][4096] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.17.70/26] IPv6=[] ContainerID="cbf73e6dcb57c0f5a9b23280ade2e64dd56509c963009ccd9fcd6ddc05957630" HandleID="k8s-pod-network.cbf73e6dcb57c0f5a9b23280ade2e64dd56509c963009ccd9fcd6ddc05957630" Workload="srv--zbif7.gb1.brightbox.com-k8s-coredns--668d6bf9bc--hksfn-eth0" Mar 17 22:05:57.458270 env[1205]: 2025-03-17 22:05:57.394 [INFO][4083] cni-plugin/k8s.go 386: Populated endpoint ContainerID="cbf73e6dcb57c0f5a9b23280ade2e64dd56509c963009ccd9fcd6ddc05957630" Namespace="kube-system" Pod="coredns-668d6bf9bc-hksfn" WorkloadEndpoint="srv--zbif7.gb1.brightbox.com-k8s-coredns--668d6bf9bc--hksfn-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--zbif7.gb1.brightbox.com-k8s-coredns--668d6bf9bc--hksfn-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"a82f42e7-3e9b-43f9-92e0-df21d942a638", ResourceVersion:"857", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 22, 5, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-zbif7.gb1.brightbox.com", ContainerID:"", Pod:"coredns-668d6bf9bc-hksfn", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.17.70/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"califdf1ac91348", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 22:05:57.458270 env[1205]: 2025-03-17 22:05:57.395 [INFO][4083] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.17.70/32] ContainerID="cbf73e6dcb57c0f5a9b23280ade2e64dd56509c963009ccd9fcd6ddc05957630" Namespace="kube-system" Pod="coredns-668d6bf9bc-hksfn" WorkloadEndpoint="srv--zbif7.gb1.brightbox.com-k8s-coredns--668d6bf9bc--hksfn-eth0" Mar 17 22:05:57.458270 env[1205]: 2025-03-17 22:05:57.395 [INFO][4083] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to califdf1ac91348 ContainerID="cbf73e6dcb57c0f5a9b23280ade2e64dd56509c963009ccd9fcd6ddc05957630" Namespace="kube-system" Pod="coredns-668d6bf9bc-hksfn" WorkloadEndpoint="srv--zbif7.gb1.brightbox.com-k8s-coredns--668d6bf9bc--hksfn-eth0" Mar 17 22:05:57.458270 env[1205]: 2025-03-17 22:05:57.416 [INFO][4083] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="cbf73e6dcb57c0f5a9b23280ade2e64dd56509c963009ccd9fcd6ddc05957630" Namespace="kube-system" Pod="coredns-668d6bf9bc-hksfn" WorkloadEndpoint="srv--zbif7.gb1.brightbox.com-k8s-coredns--668d6bf9bc--hksfn-eth0" Mar 17 22:05:57.458270 env[1205]: 2025-03-17 22:05:57.419 [INFO][4083] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="cbf73e6dcb57c0f5a9b23280ade2e64dd56509c963009ccd9fcd6ddc05957630" Namespace="kube-system" Pod="coredns-668d6bf9bc-hksfn" WorkloadEndpoint="srv--zbif7.gb1.brightbox.com-k8s-coredns--668d6bf9bc--hksfn-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--zbif7.gb1.brightbox.com-k8s-coredns--668d6bf9bc--hksfn-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"a82f42e7-3e9b-43f9-92e0-df21d942a638", ResourceVersion:"857", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 22, 5, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-zbif7.gb1.brightbox.com", ContainerID:"cbf73e6dcb57c0f5a9b23280ade2e64dd56509c963009ccd9fcd6ddc05957630", Pod:"coredns-668d6bf9bc-hksfn", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.17.70/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"califdf1ac91348", MAC:"36:11:60:08:6f:37", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 22:05:57.458270 env[1205]: 2025-03-17 22:05:57.451 [INFO][4083] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="cbf73e6dcb57c0f5a9b23280ade2e64dd56509c963009ccd9fcd6ddc05957630" Namespace="kube-system" Pod="coredns-668d6bf9bc-hksfn" WorkloadEndpoint="srv--zbif7.gb1.brightbox.com-k8s-coredns--668d6bf9bc--hksfn-eth0" Mar 17 22:05:57.488767 env[1205]: time="2025-03-17T22:05:57.486116104Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Mar 17 22:05:57.488767 env[1205]: time="2025-03-17T22:05:57.488708548Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Mar 17 22:05:57.489018 env[1205]: time="2025-03-17T22:05:57.488796392Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Mar 17 22:05:57.491758 env[1205]: time="2025-03-17T22:05:57.489650516Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/cbf73e6dcb57c0f5a9b23280ade2e64dd56509c963009ccd9fcd6ddc05957630 pid=4148 runtime=io.containerd.runc.v2 Mar 17 22:05:57.523927 systemd[1]: Started cri-containerd-cbf73e6dcb57c0f5a9b23280ade2e64dd56509c963009ccd9fcd6ddc05957630.scope. Mar 17 22:05:57.553581 env[1205]: time="2025-03-17T22:05:57.544576652Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 22:05:57.553581 env[1205]: time="2025-03-17T22:05:57.549063627Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 22:05:57.562474 env[1205]: time="2025-03-17T22:05:57.562411553Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\" returns image reference \"sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70\"" Mar 17 22:05:57.563010 env[1205]: time="2025-03-17T22:05:57.562627051Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 22:05:57.564563 env[1205]: time="2025-03-17T22:05:57.564511206Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:b8c43e264fe52e0c327b0bf3ac882a0224b33bdd7f4ff58a74242da7d9b00486,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 22:05:57.569790 sshd[4054]: Connection closed by authenticating user root 143.110.184.217 port 56974 [preauth] Mar 17 22:05:57.573414 env[1205]: time="2025-03-17T22:05:57.571918327Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\"" Mar 17 22:05:57.574000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.244.26.146:22-143.110.184.217:56974 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:05:57.580000 audit[4177]: NETFILTER_CFG table=filter:107 family=2 entries=52 op=nft_register_chain pid=4177 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Mar 17 22:05:57.580000 audit[4177]: SYSCALL arch=c000003e syscall=46 success=yes exit=24636 a0=3 a1=7ffe62253d10 a2=0 a3=7ffe62253cfc items=0 ppid=3455 pid=4177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:57.580000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Mar 17 22:05:57.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.581000 audit: BPF prog-id=193 op=LOAD Mar 17 22:05:57.574301 systemd[1]: sshd@23-10.244.26.146:22-143.110.184.217:56974.service: Deactivated successfully. Mar 17 22:05:57.588343 env[1205]: time="2025-03-17T22:05:57.587206309Z" level=info msg="CreateContainer within sandbox \"0a42b9824783a104f971969eaf7d3117b7ff1b2dd02515b4fccce50a5b7688b8\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Mar 17 22:05:57.589000 audit[4159]: AVC avc: denied { bpf } for pid=4159 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.589000 audit[4159]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=4148 pid=4159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:57.589000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362663733653664636235376330663561396232333238306164653265 Mar 17 22:05:57.589000 audit[4159]: AVC avc: denied { perfmon } for pid=4159 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.589000 audit[4159]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=4148 pid=4159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:57.589000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362663733653664636235376330663561396232333238306164653265 Mar 17 22:05:57.591000 audit[4159]: AVC avc: denied { bpf } for pid=4159 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.591000 audit[4159]: AVC avc: denied { bpf } for pid=4159 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.591000 audit[4159]: AVC avc: denied { bpf } for pid=4159 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.591000 audit[4159]: AVC avc: denied { perfmon } for pid=4159 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.591000 audit[4159]: AVC avc: denied { perfmon } for pid=4159 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.591000 audit[4159]: AVC avc: denied { perfmon } for pid=4159 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.591000 audit[4159]: AVC avc: denied { perfmon } for pid=4159 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.591000 audit[4159]: AVC avc: denied { perfmon } for pid=4159 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.591000 audit[4159]: AVC avc: denied { bpf } for pid=4159 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.591000 audit[4159]: AVC avc: denied { bpf } for pid=4159 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.591000 audit: BPF prog-id=194 op=LOAD Mar 17 22:05:57.591000 audit[4159]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000360cc0 items=0 ppid=4148 pid=4159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:57.591000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362663733653664636235376330663561396232333238306164653265 Mar 17 22:05:57.596000 audit[4159]: AVC avc: denied { bpf } for pid=4159 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.596000 audit[4159]: AVC avc: denied { bpf } for pid=4159 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.596000 audit[4159]: AVC avc: denied { perfmon } for pid=4159 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.596000 audit[4159]: AVC avc: denied { perfmon } for pid=4159 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.596000 audit[4159]: AVC avc: denied { perfmon } for pid=4159 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.596000 audit[4159]: AVC avc: denied { perfmon } for pid=4159 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.596000 audit[4159]: AVC avc: denied { perfmon } for pid=4159 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.596000 audit[4159]: AVC avc: denied { bpf } for pid=4159 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.596000 audit[4159]: AVC avc: denied { bpf } for pid=4159 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.596000 audit: BPF prog-id=195 op=LOAD Mar 17 22:05:57.596000 audit[4159]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000360d08 items=0 ppid=4148 pid=4159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:57.596000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362663733653664636235376330663561396232333238306164653265 Mar 17 22:05:57.596000 audit: BPF prog-id=195 op=UNLOAD Mar 17 22:05:57.599000 audit: BPF prog-id=194 op=UNLOAD Mar 17 22:05:57.599000 audit[4159]: AVC avc: denied { bpf } for pid=4159 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.599000 audit[4159]: AVC avc: denied { bpf } for pid=4159 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.599995 env[1205]: time="2025-03-17T22:05:57.599801244Z" level=info msg="StartContainer for \"b6b143babede96ab4cc2a0d50e25a04455503651f3bcbafebe0dec63df22d948\" returns successfully" Mar 17 22:05:57.599000 audit[4159]: AVC avc: denied { bpf } for pid=4159 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.599000 audit[4159]: AVC avc: denied { perfmon } for pid=4159 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.599000 audit[4159]: AVC avc: denied { perfmon } for pid=4159 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.599000 audit[4159]: AVC avc: denied { perfmon } for pid=4159 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.599000 audit[4159]: AVC avc: denied { perfmon } for pid=4159 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.599000 audit[4159]: AVC avc: denied { perfmon } for pid=4159 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.599000 audit[4159]: AVC avc: denied { bpf } for pid=4159 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.599000 audit[4159]: AVC avc: denied { bpf } for pid=4159 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.599000 audit: BPF prog-id=196 op=LOAD Mar 17 22:05:57.599000 audit[4159]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000361118 items=0 ppid=4148 pid=4159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:57.599000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362663733653664636235376330663561396232333238306164653265 Mar 17 22:05:57.629497 env[1205]: time="2025-03-17T22:05:57.629417727Z" level=info msg="CreateContainer within sandbox \"0a42b9824783a104f971969eaf7d3117b7ff1b2dd02515b4fccce50a5b7688b8\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"663d02f0b395f0487a96d019c5dc28d26752b8b468b40a3f4612500f0c4c25be\"" Mar 17 22:05:57.631670 env[1205]: time="2025-03-17T22:05:57.631608598Z" level=info msg="StartContainer for \"663d02f0b395f0487a96d019c5dc28d26752b8b468b40a3f4612500f0c4c25be\"" Mar 17 22:05:57.680688 systemd[1]: Started cri-containerd-663d02f0b395f0487a96d019c5dc28d26752b8b468b40a3f4612500f0c4c25be.scope. Mar 17 22:05:57.720000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.720000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.720000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.720000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.720000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.720000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.720000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.720000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.720000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.720000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.720000 audit: BPF prog-id=197 op=LOAD Mar 17 22:05:57.722000 audit[4196]: AVC avc: denied { bpf } for pid=4196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.722000 audit[4196]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3694 pid=4196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:57.722000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636336430326630623339356630343837613936643031396335646332 Mar 17 22:05:57.722000 audit[4196]: AVC avc: denied { perfmon } for pid=4196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.722000 audit[4196]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3694 pid=4196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:57.722000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636336430326630623339356630343837613936643031396335646332 Mar 17 22:05:57.723000 audit[4196]: AVC avc: denied { bpf } for pid=4196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.723000 audit[4196]: AVC avc: denied { bpf } for pid=4196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.723000 audit[4196]: AVC avc: denied { bpf } for pid=4196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.723000 audit[4196]: AVC avc: denied { perfmon } for pid=4196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.723000 audit[4196]: AVC avc: denied { perfmon } for pid=4196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.723000 audit[4196]: AVC avc: denied { perfmon } for pid=4196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.723000 audit[4196]: AVC avc: denied { perfmon } for pid=4196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.723000 audit[4196]: AVC avc: denied { perfmon } for pid=4196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.723000 audit[4196]: AVC avc: denied { bpf } for pid=4196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.723000 audit[4196]: AVC avc: denied { bpf } for pid=4196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.723000 audit: BPF prog-id=198 op=LOAD Mar 17 22:05:57.723000 audit[4196]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00032fd30 items=0 ppid=3694 pid=4196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:57.723000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636336430326630623339356630343837613936643031396335646332 Mar 17 22:05:57.723000 audit[4196]: AVC avc: denied { bpf } for pid=4196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.723000 audit[4196]: AVC avc: denied { bpf } for pid=4196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.723000 audit[4196]: AVC avc: denied { perfmon } for pid=4196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.723000 audit[4196]: AVC avc: denied { perfmon } for pid=4196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.723000 audit[4196]: AVC avc: denied { perfmon } for pid=4196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.723000 audit[4196]: AVC avc: denied { perfmon } for pid=4196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.723000 audit[4196]: AVC avc: denied { perfmon } for pid=4196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.723000 audit[4196]: AVC avc: denied { bpf } for pid=4196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.723000 audit[4196]: AVC avc: denied { bpf } for pid=4196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.723000 audit: BPF prog-id=199 op=LOAD Mar 17 22:05:57.723000 audit[4196]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00032fd78 items=0 ppid=3694 pid=4196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:57.723000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636336430326630623339356630343837613936643031396335646332 Mar 17 22:05:57.723000 audit: BPF prog-id=199 op=UNLOAD Mar 17 22:05:57.723000 audit: BPF prog-id=198 op=UNLOAD Mar 17 22:05:57.723000 audit[4196]: AVC avc: denied { bpf } for pid=4196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.723000 audit[4196]: AVC avc: denied { bpf } for pid=4196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.723000 audit[4196]: AVC avc: denied { bpf } for pid=4196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.723000 audit[4196]: AVC avc: denied { perfmon } for pid=4196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.723000 audit[4196]: AVC avc: denied { perfmon } for pid=4196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.723000 audit[4196]: AVC avc: denied { perfmon } for pid=4196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.723000 audit[4196]: AVC avc: denied { perfmon } for pid=4196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.723000 audit[4196]: AVC avc: denied { perfmon } for pid=4196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.723000 audit[4196]: AVC avc: denied { bpf } for pid=4196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.723000 audit[4196]: AVC avc: denied { bpf } for pid=4196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.723000 audit: BPF prog-id=200 op=LOAD Mar 17 22:05:57.723000 audit[4196]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000396188 items=0 ppid=3694 pid=4196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:57.723000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636336430326630623339356630343837613936643031396335646332 Mar 17 22:05:57.744649 env[1205]: time="2025-03-17T22:05:57.744454259Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-hksfn,Uid:a82f42e7-3e9b-43f9-92e0-df21d942a638,Namespace:kube-system,Attempt:1,} returns sandbox id \"cbf73e6dcb57c0f5a9b23280ade2e64dd56509c963009ccd9fcd6ddc05957630\"" Mar 17 22:05:57.758294 env[1205]: time="2025-03-17T22:05:57.758221196Z" level=info msg="CreateContainer within sandbox \"cbf73e6dcb57c0f5a9b23280ade2e64dd56509c963009ccd9fcd6ddc05957630\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Mar 17 22:05:57.797762 env[1205]: time="2025-03-17T22:05:57.797693419Z" level=info msg="CreateContainer within sandbox \"cbf73e6dcb57c0f5a9b23280ade2e64dd56509c963009ccd9fcd6ddc05957630\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"51078895c5ee5fbd721fb979475def89b2e029719bdc21d35edaa8ccf222c015\"" Mar 17 22:05:57.799371 env[1205]: time="2025-03-17T22:05:57.799294872Z" level=info msg="StartContainer for \"51078895c5ee5fbd721fb979475def89b2e029719bdc21d35edaa8ccf222c015\"" Mar 17 22:05:57.819315 env[1205]: time="2025-03-17T22:05:57.819241247Z" level=info msg="StartContainer for \"663d02f0b395f0487a96d019c5dc28d26752b8b468b40a3f4612500f0c4c25be\" returns successfully" Mar 17 22:05:57.846321 systemd[1]: Started cri-containerd-51078895c5ee5fbd721fb979475def89b2e029719bdc21d35edaa8ccf222c015.scope. Mar 17 22:05:57.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.890000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.890000 audit: BPF prog-id=201 op=LOAD Mar 17 22:05:57.892000 audit[4237]: AVC avc: denied { bpf } for pid=4237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.892000 audit[4237]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4148 pid=4237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:57.892000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531303738383935633565653566626437323166623937393437356465 Mar 17 22:05:57.892000 audit[4237]: AVC avc: denied { perfmon } for pid=4237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.892000 audit[4237]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=4148 pid=4237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:57.892000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531303738383935633565653566626437323166623937393437356465 Mar 17 22:05:57.892000 audit[4237]: AVC avc: denied { bpf } for pid=4237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.892000 audit[4237]: AVC avc: denied { bpf } for pid=4237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.892000 audit[4237]: AVC avc: denied { bpf } for pid=4237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.892000 audit[4237]: AVC avc: denied { perfmon } for pid=4237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.892000 audit[4237]: AVC avc: denied { perfmon } for pid=4237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.892000 audit[4237]: AVC avc: denied { perfmon } for pid=4237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.892000 audit[4237]: AVC avc: denied { perfmon } for pid=4237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.892000 audit[4237]: AVC avc: denied { perfmon } for pid=4237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.892000 audit[4237]: AVC avc: denied { bpf } for pid=4237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.892000 audit[4237]: AVC avc: denied { bpf } for pid=4237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.892000 audit: BPF prog-id=202 op=LOAD Mar 17 22:05:57.892000 audit[4237]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000293290 items=0 ppid=4148 pid=4237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:57.892000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531303738383935633565653566626437323166623937393437356465 Mar 17 22:05:57.892000 audit[4237]: AVC avc: denied { bpf } for pid=4237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.892000 audit[4237]: AVC avc: denied { bpf } for pid=4237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.892000 audit[4237]: AVC avc: denied { perfmon } for pid=4237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.892000 audit[4237]: AVC avc: denied { perfmon } for pid=4237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.892000 audit[4237]: AVC avc: denied { perfmon } for pid=4237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.892000 audit[4237]: AVC avc: denied { perfmon } for pid=4237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.892000 audit[4237]: AVC avc: denied { perfmon } for pid=4237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.892000 audit[4237]: AVC avc: denied { bpf } for pid=4237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.892000 audit[4237]: AVC avc: denied { bpf } for pid=4237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.892000 audit: BPF prog-id=203 op=LOAD Mar 17 22:05:57.892000 audit[4237]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002932d8 items=0 ppid=4148 pid=4237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:57.892000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531303738383935633565653566626437323166623937393437356465 Mar 17 22:05:57.892000 audit: BPF prog-id=203 op=UNLOAD Mar 17 22:05:57.892000 audit: BPF prog-id=202 op=UNLOAD Mar 17 22:05:57.892000 audit[4237]: AVC avc: denied { bpf } for pid=4237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.892000 audit[4237]: AVC avc: denied { bpf } for pid=4237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.892000 audit[4237]: AVC avc: denied { bpf } for pid=4237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.892000 audit[4237]: AVC avc: denied { perfmon } for pid=4237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.892000 audit[4237]: AVC avc: denied { perfmon } for pid=4237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.892000 audit[4237]: AVC avc: denied { perfmon } for pid=4237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.892000 audit[4237]: AVC avc: denied { perfmon } for pid=4237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.892000 audit[4237]: AVC avc: denied { perfmon } for pid=4237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.892000 audit[4237]: AVC avc: denied { bpf } for pid=4237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.892000 audit[4237]: AVC avc: denied { bpf } for pid=4237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:57.892000 audit: BPF prog-id=204 op=LOAD Mar 17 22:05:57.892000 audit[4237]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0002936e8 items=0 ppid=4148 pid=4237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:57.892000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531303738383935633565653566626437323166623937393437356465 Mar 17 22:05:57.926353 env[1205]: time="2025-03-17T22:05:57.926292726Z" level=info msg="StartContainer for \"51078895c5ee5fbd721fb979475def89b2e029719bdc21d35edaa8ccf222c015\" returns successfully" Mar 17 22:05:58.070537 systemd[1]: run-containerd-runc-k8s.io-b6b143babede96ab4cc2a0d50e25a04455503651f3bcbafebe0dec63df22d948-runc.VlVVMx.mount: Deactivated successfully. Mar 17 22:05:58.108000 audit[4251]: AVC avc: denied { getattr } for pid=4251 comm="coredns" path="cgroup:[4026532492]" dev="nsfs" ino=4026532492 scontext=system_u:system_r:svirt_lxc_net_t:s0:c704,c934 tcontext=system_u:object_r:nsfs_t:s0 tclass=file permissive=0 Mar 17 22:05:58.108000 audit[4251]: SYSCALL arch=c000003e syscall=262 success=no exit=-13 a0=ffffffffffffff9c a1=c0000589a8 a2=c0004f8ac8 a3=0 items=0 ppid=4148 pid=4251 auid=4294967295 uid=65532 gid=65532 euid=65532 suid=65532 fsuid=65532 egid=65532 sgid=65532 fsgid=65532 tty=(none) ses=4294967295 comm="coredns" exe="/coredns" subj=system_u:system_r:svirt_lxc_net_t:s0:c704,c934 key=(null) Mar 17 22:05:58.108000 audit: PROCTITLE proctitle=2F636F7265646E73002D636F6E66002F6574632F636F7265646E732F436F726566696C65 Mar 17 22:05:58.150228 kubelet[2045]: I0317 22:05:58.150148 2045 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-668d6bf9bc-hksfn" podStartSLOduration=54.150094058 podStartE2EDuration="54.150094058s" podCreationTimestamp="2025-03-17 22:05:04 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-03-17 22:05:58.114685871 +0000 UTC m=+57.791060390" watchObservedRunningTime="2025-03-17 22:05:58.150094058 +0000 UTC m=+57.826468565" Mar 17 22:05:58.151195 kubelet[2045]: I0317 22:05:58.151150 2045 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-df4ccfbfc-h8m5j" podStartSLOduration=34.387941048 podStartE2EDuration="44.151139199s" podCreationTimestamp="2025-03-17 22:05:14 +0000 UTC" firstStartedPulling="2025-03-17 22:05:47.313829976 +0000 UTC m=+46.990204478" lastFinishedPulling="2025-03-17 22:05:57.077028116 +0000 UTC m=+56.753402629" observedRunningTime="2025-03-17 22:05:58.148788007 +0000 UTC m=+57.825162525" watchObservedRunningTime="2025-03-17 22:05:58.151139199 +0000 UTC m=+57.827513707" Mar 17 22:05:58.268099 kubelet[2045]: I0317 22:05:58.267960 2045 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-9cf959fb7-6grpc" podStartSLOduration=35.077502263 podStartE2EDuration="45.267928653s" podCreationTimestamp="2025-03-17 22:05:13 +0000 UTC" firstStartedPulling="2025-03-17 22:05:47.379965464 +0000 UTC m=+47.056339965" lastFinishedPulling="2025-03-17 22:05:57.570391844 +0000 UTC m=+57.246766355" observedRunningTime="2025-03-17 22:05:58.180349006 +0000 UTC m=+57.856723537" watchObservedRunningTime="2025-03-17 22:05:58.267928653 +0000 UTC m=+57.944303166" Mar 17 22:05:58.274000 audit[4291]: NETFILTER_CFG table=filter:108 family=2 entries=10 op=nft_register_rule pid=4291 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 22:05:58.274000 audit[4291]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffedeb02300 a2=0 a3=7ffedeb022ec items=0 ppid=2206 pid=4291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:58.274000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 22:05:58.294000 audit[4291]: NETFILTER_CFG table=nat:109 family=2 entries=44 op=nft_register_rule pid=4291 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 22:05:58.294000 audit[4291]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffedeb02300 a2=0 a3=7ffedeb022ec items=0 ppid=2206 pid=4291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:58.294000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 22:05:58.321000 audit[4293]: NETFILTER_CFG table=filter:110 family=2 entries=10 op=nft_register_rule pid=4293 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 22:05:58.321000 audit[4293]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffce2111390 a2=0 a3=7ffce211137c items=0 ppid=2206 pid=4293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:58.321000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 22:05:58.330000 audit[4293]: NETFILTER_CFG table=nat:111 family=2 entries=20 op=nft_register_rule pid=4293 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 22:05:58.330000 audit[4293]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffce2111390 a2=0 a3=7ffce211137c items=0 ppid=2206 pid=4293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:58.330000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 22:05:59.017136 kubelet[2045]: I0317 22:05:59.017092 2045 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Mar 17 22:05:59.067005 systemd-networkd[1031]: califdf1ac91348: Gained IPv6LL Mar 17 22:05:59.367925 kernel: kauditd_printk_skb: 329 callbacks suppressed Mar 17 22:05:59.368200 kernel: audit: type=1325 audit(1742249159.360:1384): table=filter:112 family=2 entries=10 op=nft_register_rule pid=4298 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 22:05:59.360000 audit[4298]: NETFILTER_CFG table=filter:112 family=2 entries=10 op=nft_register_rule pid=4298 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 22:05:59.360000 audit[4298]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffc22e20d00 a2=0 a3=7ffc22e20cec items=0 ppid=2206 pid=4298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:59.377624 kernel: audit: type=1300 audit(1742249159.360:1384): arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffc22e20d00 a2=0 a3=7ffc22e20cec items=0 ppid=2206 pid=4298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:59.360000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 22:05:59.382686 kernel: audit: type=1327 audit(1742249159.360:1384): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 22:05:59.435000 audit[4298]: NETFILTER_CFG table=nat:113 family=2 entries=56 op=nft_register_chain pid=4298 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 22:05:59.441572 kernel: audit: type=1325 audit(1742249159.435:1385): table=nat:113 family=2 entries=56 op=nft_register_chain pid=4298 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 22:05:59.435000 audit[4298]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7ffc22e20d00 a2=0 a3=7ffc22e20cec items=0 ppid=2206 pid=4298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:59.450584 kernel: audit: type=1300 audit(1742249159.435:1385): arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7ffc22e20d00 a2=0 a3=7ffc22e20cec items=0 ppid=2206 pid=4298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:59.454897 kernel: audit: type=1327 audit(1742249159.435:1385): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 22:05:59.435000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 22:05:59.556000 audit[4209]: AVC avc: denied { watch } for pid=4209 comm="apiserver" path="/calico-apiserver-certs/..2025_03_17_22_05_30.645549096/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c22,c568 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c22,c568 tclass=file permissive=0 Mar 17 22:05:59.565752 kernel: audit: type=1400 audit(1742249159.556:1386): avc: denied { watch } for pid=4209 comm="apiserver" path="/calico-apiserver-certs/..2025_03_17_22_05_30.645549096/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c22,c568 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c22,c568 tclass=file permissive=0 Mar 17 22:05:59.556000 audit[4209]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000b2d2c0 a2=fc6 a3=0 items=0 ppid=3694 pid=4209 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c22,c568 key=(null) Mar 17 22:05:59.576594 kernel: audit: type=1300 audit(1742249159.556:1386): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000b2d2c0 a2=fc6 a3=0 items=0 ppid=3694 pid=4209 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c22,c568 key=(null) Mar 17 22:05:59.556000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Mar 17 22:05:59.587577 kernel: audit: type=1327 audit(1742249159.556:1386): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Mar 17 22:05:59.771277 env[1205]: time="2025-03-17T22:05:59.771200604Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 22:05:59.775244 env[1205]: time="2025-03-17T22:05:59.775199944Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 22:05:59.778121 env[1205]: time="2025-03-17T22:05:59.778078932Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 22:05:59.781236 env[1205]: time="2025-03-17T22:05:59.781198574Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:a338da9488cbaa83c78457c3d7354d84149969c0480e88dd768e036632ff5b76,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 22:05:59.782354 env[1205]: time="2025-03-17T22:05:59.782303581Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\" returns image reference \"sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f\"" Mar 17 22:05:59.790855 env[1205]: time="2025-03-17T22:05:59.790666049Z" level=info msg="CreateContainer within sandbox \"0893610d76e3664367dde23252a185830b00cabcf4b587817760b37e2db5fc44\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Mar 17 22:05:59.815131 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2525754198.mount: Deactivated successfully. Mar 17 22:05:59.825439 env[1205]: time="2025-03-17T22:05:59.825353975Z" level=info msg="CreateContainer within sandbox \"0893610d76e3664367dde23252a185830b00cabcf4b587817760b37e2db5fc44\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"baa2db380af0c2ab4385f8bb98b307d494d673eae71b89d196b89493eb5e5ac6\"" Mar 17 22:05:59.830143 env[1205]: time="2025-03-17T22:05:59.830084758Z" level=info msg="StartContainer for \"baa2db380af0c2ab4385f8bb98b307d494d673eae71b89d196b89493eb5e5ac6\"" Mar 17 22:05:59.879267 systemd[1]: run-containerd-runc-k8s.io-baa2db380af0c2ab4385f8bb98b307d494d673eae71b89d196b89493eb5e5ac6-runc.3R0MDC.mount: Deactivated successfully. Mar 17 22:05:59.883922 systemd[1]: Started cri-containerd-baa2db380af0c2ab4385f8bb98b307d494d673eae71b89d196b89493eb5e5ac6.scope. Mar 17 22:05:59.950427 kernel: audit: type=1400 audit(1742249159.939:1387): avc: denied { perfmon } for pid=4311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:59.939000 audit[4311]: AVC avc: denied { perfmon } for pid=4311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:59.939000 audit[4311]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014f6b0 a2=3c a3=7f3aec6b5838 items=0 ppid=3327 pid=4311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:59.939000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261613264623338306166306332616234333835663862623938623330 Mar 17 22:05:59.943000 audit[4311]: AVC avc: denied { bpf } for pid=4311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:59.943000 audit[4311]: AVC avc: denied { bpf } for pid=4311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:59.943000 audit[4311]: AVC avc: denied { bpf } for pid=4311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:59.943000 audit[4311]: AVC avc: denied { perfmon } for pid=4311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:59.943000 audit[4311]: AVC avc: denied { perfmon } for pid=4311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:59.943000 audit[4311]: AVC avc: denied { perfmon } for pid=4311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:59.943000 audit[4311]: AVC avc: denied { perfmon } for pid=4311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:59.943000 audit[4311]: AVC avc: denied { perfmon } for pid=4311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:59.943000 audit[4311]: AVC avc: denied { bpf } for pid=4311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:59.943000 audit[4311]: AVC avc: denied { bpf } for pid=4311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:59.943000 audit: BPF prog-id=205 op=LOAD Mar 17 22:05:59.943000 audit[4311]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014f9d8 a2=78 a3=c00020c218 items=0 ppid=3327 pid=4311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:59.943000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261613264623338306166306332616234333835663862623938623330 Mar 17 22:05:59.949000 audit[4311]: AVC avc: denied { bpf } for pid=4311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:59.949000 audit[4311]: AVC avc: denied { bpf } for pid=4311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:59.949000 audit[4311]: AVC avc: denied { perfmon } for pid=4311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:59.949000 audit[4311]: AVC avc: denied { perfmon } for pid=4311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:59.949000 audit[4311]: AVC avc: denied { perfmon } for pid=4311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:59.949000 audit[4311]: AVC avc: denied { perfmon } for pid=4311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:59.949000 audit[4311]: AVC avc: denied { perfmon } for pid=4311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:59.949000 audit[4311]: AVC avc: denied { bpf } for pid=4311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:59.949000 audit[4311]: AVC avc: denied { bpf } for pid=4311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:59.949000 audit: BPF prog-id=206 op=LOAD Mar 17 22:05:59.949000 audit[4311]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014f770 a2=78 a3=c00020c268 items=0 ppid=3327 pid=4311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:59.949000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261613264623338306166306332616234333835663862623938623330 Mar 17 22:05:59.949000 audit: BPF prog-id=206 op=UNLOAD Mar 17 22:05:59.949000 audit: BPF prog-id=205 op=UNLOAD Mar 17 22:05:59.949000 audit[4311]: AVC avc: denied { bpf } for pid=4311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:59.949000 audit[4311]: AVC avc: denied { bpf } for pid=4311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:59.949000 audit[4311]: AVC avc: denied { bpf } for pid=4311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:59.949000 audit[4311]: AVC avc: denied { perfmon } for pid=4311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:59.949000 audit[4311]: AVC avc: denied { perfmon } for pid=4311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:59.949000 audit[4311]: AVC avc: denied { perfmon } for pid=4311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:59.949000 audit[4311]: AVC avc: denied { perfmon } for pid=4311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:59.949000 audit[4311]: AVC avc: denied { perfmon } for pid=4311 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:59.949000 audit[4311]: AVC avc: denied { bpf } for pid=4311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:59.949000 audit[4311]: AVC avc: denied { bpf } for pid=4311 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 22:05:59.949000 audit: BPF prog-id=207 op=LOAD Mar 17 22:05:59.949000 audit[4311]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014fc30 a2=78 a3=c00020c2f8 items=0 ppid=3327 pid=4311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:05:59.949000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261613264623338306166306332616234333835663862623938623330 Mar 17 22:05:59.991126 env[1205]: time="2025-03-17T22:05:59.990970216Z" level=info msg="StartContainer for \"baa2db380af0c2ab4385f8bb98b307d494d673eae71b89d196b89493eb5e5ac6\" returns successfully" Mar 17 22:06:00.058679 kubelet[2045]: I0317 22:06:00.057928 2045 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-8qsmb" podStartSLOduration=33.052641273 podStartE2EDuration="47.057900827s" podCreationTimestamp="2025-03-17 22:05:13 +0000 UTC" firstStartedPulling="2025-03-17 22:05:45.780588842 +0000 UTC m=+45.456963348" lastFinishedPulling="2025-03-17 22:05:59.785848389 +0000 UTC m=+59.462222902" observedRunningTime="2025-03-17 22:06:00.057863936 +0000 UTC m=+59.734238450" watchObservedRunningTime="2025-03-17 22:06:00.057900827 +0000 UTC m=+59.734275337" Mar 17 22:06:00.630854 env[1205]: time="2025-03-17T22:06:00.630782146Z" level=info msg="StopPodSandbox for \"1a6e0fa047fd2311b532c4efbd12e41d6da3834f1825ac8355467466bd832654\"" Mar 17 22:06:00.648000 audit[1929]: AVC avc: denied { watch } for pid=1929 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526376 scontext=system_u:system_r:svirt_lxc_net_t:s0:c616,c864 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 22:06:00.648000 audit[1929]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00036b080 a2=fc6 a3=0 items=0 ppid=1787 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c616,c864 key=(null) Mar 17 22:06:00.648000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Mar 17 22:06:00.648000 audit[1929]: AVC avc: denied { watch } for pid=1929 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526376 scontext=system_u:system_r:svirt_lxc_net_t:s0:c616,c864 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 22:06:00.648000 audit[1929]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00036b0e0 a2=fc6 a3=0 items=0 ppid=1787 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c616,c864 key=(null) Mar 17 22:06:00.648000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Mar 17 22:06:00.649000 audit[1929]: AVC avc: denied { watch } for pid=1929 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526376 scontext=system_u:system_r:svirt_lxc_net_t:s0:c616,c864 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 22:06:00.649000 audit[1929]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00048cde0 a2=fc6 a3=0 items=0 ppid=1787 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c616,c864 key=(null) Mar 17 22:06:00.649000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Mar 17 22:06:00.650000 audit[1929]: AVC avc: denied { watch } for pid=1929 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526376 scontext=system_u:system_r:svirt_lxc_net_t:s0:c616,c864 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 22:06:00.650000 audit[1929]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00048ce60 a2=fc6 a3=0 items=0 ppid=1787 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c616,c864 key=(null) Mar 17 22:06:00.650000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Mar 17 22:06:00.844649 env[1205]: 2025-03-17 22:06:00.728 [WARNING][4355] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="1a6e0fa047fd2311b532c4efbd12e41d6da3834f1825ac8355467466bd832654" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--zbif7.gb1.brightbox.com-k8s-calico--kube--controllers--df4ccfbfc--h8m5j-eth0", GenerateName:"calico-kube-controllers-df4ccfbfc-", Namespace:"calico-system", SelfLink:"", UID:"62b3841b-0f84-466f-921a-c6f2f9062835", ResourceVersion:"883", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 22, 5, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"df4ccfbfc", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-zbif7.gb1.brightbox.com", ContainerID:"a9506756dd2c6d8172cef2e734f8497688fa20b88e335776a7112a23e73fce38", Pod:"calico-kube-controllers-df4ccfbfc-h8m5j", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.17.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali394e9994a6f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 22:06:00.844649 env[1205]: 2025-03-17 22:06:00.729 [INFO][4355] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="1a6e0fa047fd2311b532c4efbd12e41d6da3834f1825ac8355467466bd832654" Mar 17 22:06:00.844649 env[1205]: 2025-03-17 22:06:00.729 [INFO][4355] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="1a6e0fa047fd2311b532c4efbd12e41d6da3834f1825ac8355467466bd832654" iface="eth0" netns="" Mar 17 22:06:00.844649 env[1205]: 2025-03-17 22:06:00.729 [INFO][4355] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="1a6e0fa047fd2311b532c4efbd12e41d6da3834f1825ac8355467466bd832654" Mar 17 22:06:00.844649 env[1205]: 2025-03-17 22:06:00.729 [INFO][4355] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1a6e0fa047fd2311b532c4efbd12e41d6da3834f1825ac8355467466bd832654" Mar 17 22:06:00.844649 env[1205]: 2025-03-17 22:06:00.815 [INFO][4361] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="1a6e0fa047fd2311b532c4efbd12e41d6da3834f1825ac8355467466bd832654" HandleID="k8s-pod-network.1a6e0fa047fd2311b532c4efbd12e41d6da3834f1825ac8355467466bd832654" Workload="srv--zbif7.gb1.brightbox.com-k8s-calico--kube--controllers--df4ccfbfc--h8m5j-eth0" Mar 17 22:06:00.844649 env[1205]: 2025-03-17 22:06:00.815 [INFO][4361] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 22:06:00.844649 env[1205]: 2025-03-17 22:06:00.815 [INFO][4361] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 22:06:00.844649 env[1205]: 2025-03-17 22:06:00.835 [WARNING][4361] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="1a6e0fa047fd2311b532c4efbd12e41d6da3834f1825ac8355467466bd832654" HandleID="k8s-pod-network.1a6e0fa047fd2311b532c4efbd12e41d6da3834f1825ac8355467466bd832654" Workload="srv--zbif7.gb1.brightbox.com-k8s-calico--kube--controllers--df4ccfbfc--h8m5j-eth0" Mar 17 22:06:00.844649 env[1205]: 2025-03-17 22:06:00.835 [INFO][4361] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="1a6e0fa047fd2311b532c4efbd12e41d6da3834f1825ac8355467466bd832654" HandleID="k8s-pod-network.1a6e0fa047fd2311b532c4efbd12e41d6da3834f1825ac8355467466bd832654" Workload="srv--zbif7.gb1.brightbox.com-k8s-calico--kube--controllers--df4ccfbfc--h8m5j-eth0" Mar 17 22:06:00.844649 env[1205]: 2025-03-17 22:06:00.838 [INFO][4361] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 22:06:00.844649 env[1205]: 2025-03-17 22:06:00.841 [INFO][4355] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="1a6e0fa047fd2311b532c4efbd12e41d6da3834f1825ac8355467466bd832654" Mar 17 22:06:00.846027 env[1205]: time="2025-03-17T22:06:00.844921445Z" level=info msg="TearDown network for sandbox \"1a6e0fa047fd2311b532c4efbd12e41d6da3834f1825ac8355467466bd832654\" successfully" Mar 17 22:06:00.846027 env[1205]: time="2025-03-17T22:06:00.844978091Z" level=info msg="StopPodSandbox for \"1a6e0fa047fd2311b532c4efbd12e41d6da3834f1825ac8355467466bd832654\" returns successfully" Mar 17 22:06:00.868671 env[1205]: time="2025-03-17T22:06:00.867821767Z" level=info msg="RemovePodSandbox for \"1a6e0fa047fd2311b532c4efbd12e41d6da3834f1825ac8355467466bd832654\"" Mar 17 22:06:00.868671 env[1205]: time="2025-03-17T22:06:00.867880893Z" level=info msg="Forcibly stopping sandbox \"1a6e0fa047fd2311b532c4efbd12e41d6da3834f1825ac8355467466bd832654\"" Mar 17 22:06:00.898749 kubelet[2045]: I0317 22:06:00.890355 2045 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Mar 17 22:06:00.902567 kubelet[2045]: I0317 22:06:00.902495 2045 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Mar 17 22:06:01.043048 env[1205]: 2025-03-17 22:06:00.958 [WARNING][4382] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="1a6e0fa047fd2311b532c4efbd12e41d6da3834f1825ac8355467466bd832654" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--zbif7.gb1.brightbox.com-k8s-calico--kube--controllers--df4ccfbfc--h8m5j-eth0", GenerateName:"calico-kube-controllers-df4ccfbfc-", Namespace:"calico-system", SelfLink:"", UID:"62b3841b-0f84-466f-921a-c6f2f9062835", ResourceVersion:"883", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 22, 5, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"df4ccfbfc", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-zbif7.gb1.brightbox.com", ContainerID:"a9506756dd2c6d8172cef2e734f8497688fa20b88e335776a7112a23e73fce38", Pod:"calico-kube-controllers-df4ccfbfc-h8m5j", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.17.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali394e9994a6f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 22:06:01.043048 env[1205]: 2025-03-17 22:06:00.959 [INFO][4382] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="1a6e0fa047fd2311b532c4efbd12e41d6da3834f1825ac8355467466bd832654" Mar 17 22:06:01.043048 env[1205]: 2025-03-17 22:06:00.959 [INFO][4382] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="1a6e0fa047fd2311b532c4efbd12e41d6da3834f1825ac8355467466bd832654" iface="eth0" netns="" Mar 17 22:06:01.043048 env[1205]: 2025-03-17 22:06:00.959 [INFO][4382] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="1a6e0fa047fd2311b532c4efbd12e41d6da3834f1825ac8355467466bd832654" Mar 17 22:06:01.043048 env[1205]: 2025-03-17 22:06:00.959 [INFO][4382] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1a6e0fa047fd2311b532c4efbd12e41d6da3834f1825ac8355467466bd832654" Mar 17 22:06:01.043048 env[1205]: 2025-03-17 22:06:01.011 [INFO][4388] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="1a6e0fa047fd2311b532c4efbd12e41d6da3834f1825ac8355467466bd832654" HandleID="k8s-pod-network.1a6e0fa047fd2311b532c4efbd12e41d6da3834f1825ac8355467466bd832654" Workload="srv--zbif7.gb1.brightbox.com-k8s-calico--kube--controllers--df4ccfbfc--h8m5j-eth0" Mar 17 22:06:01.043048 env[1205]: 2025-03-17 22:06:01.019 [INFO][4388] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 22:06:01.043048 env[1205]: 2025-03-17 22:06:01.020 [INFO][4388] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 22:06:01.043048 env[1205]: 2025-03-17 22:06:01.028 [WARNING][4388] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="1a6e0fa047fd2311b532c4efbd12e41d6da3834f1825ac8355467466bd832654" HandleID="k8s-pod-network.1a6e0fa047fd2311b532c4efbd12e41d6da3834f1825ac8355467466bd832654" Workload="srv--zbif7.gb1.brightbox.com-k8s-calico--kube--controllers--df4ccfbfc--h8m5j-eth0" Mar 17 22:06:01.043048 env[1205]: 2025-03-17 22:06:01.028 [INFO][4388] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="1a6e0fa047fd2311b532c4efbd12e41d6da3834f1825ac8355467466bd832654" HandleID="k8s-pod-network.1a6e0fa047fd2311b532c4efbd12e41d6da3834f1825ac8355467466bd832654" Workload="srv--zbif7.gb1.brightbox.com-k8s-calico--kube--controllers--df4ccfbfc--h8m5j-eth0" Mar 17 22:06:01.043048 env[1205]: 2025-03-17 22:06:01.031 [INFO][4388] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 22:06:01.043048 env[1205]: 2025-03-17 22:06:01.036 [INFO][4382] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="1a6e0fa047fd2311b532c4efbd12e41d6da3834f1825ac8355467466bd832654" Mar 17 22:06:01.044432 env[1205]: time="2025-03-17T22:06:01.044367064Z" level=info msg="TearDown network for sandbox \"1a6e0fa047fd2311b532c4efbd12e41d6da3834f1825ac8355467466bd832654\" successfully" Mar 17 22:06:01.052302 env[1205]: time="2025-03-17T22:06:01.052234066Z" level=info msg="RemovePodSandbox \"1a6e0fa047fd2311b532c4efbd12e41d6da3834f1825ac8355467466bd832654\" returns successfully" Mar 17 22:06:01.055660 env[1205]: time="2025-03-17T22:06:01.055442553Z" level=info msg="StopPodSandbox for \"7b7de6ee875cb03d8c5c06602b11497caeb90ad58224ff1037ca6ff34c3d6380\"" Mar 17 22:06:01.236987 env[1205]: 2025-03-17 22:06:01.171 [WARNING][4408] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="7b7de6ee875cb03d8c5c06602b11497caeb90ad58224ff1037ca6ff34c3d6380" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--zbif7.gb1.brightbox.com-k8s-csi--node--driver--8qsmb-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"72a58b73-e5b8-4cf5-bcd4-e7ba6f464863", ResourceVersion:"897", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 22, 5, 13, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"84cddb44f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-zbif7.gb1.brightbox.com", ContainerID:"0893610d76e3664367dde23252a185830b00cabcf4b587817760b37e2db5fc44", Pod:"csi-node-driver-8qsmb", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.17.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"califfa9ffe3af9", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 22:06:01.236987 env[1205]: 2025-03-17 22:06:01.172 [INFO][4408] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="7b7de6ee875cb03d8c5c06602b11497caeb90ad58224ff1037ca6ff34c3d6380" Mar 17 22:06:01.236987 env[1205]: 2025-03-17 22:06:01.172 [INFO][4408] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="7b7de6ee875cb03d8c5c06602b11497caeb90ad58224ff1037ca6ff34c3d6380" iface="eth0" netns="" Mar 17 22:06:01.236987 env[1205]: 2025-03-17 22:06:01.172 [INFO][4408] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="7b7de6ee875cb03d8c5c06602b11497caeb90ad58224ff1037ca6ff34c3d6380" Mar 17 22:06:01.236987 env[1205]: 2025-03-17 22:06:01.172 [INFO][4408] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="7b7de6ee875cb03d8c5c06602b11497caeb90ad58224ff1037ca6ff34c3d6380" Mar 17 22:06:01.236987 env[1205]: 2025-03-17 22:06:01.211 [INFO][4415] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="7b7de6ee875cb03d8c5c06602b11497caeb90ad58224ff1037ca6ff34c3d6380" HandleID="k8s-pod-network.7b7de6ee875cb03d8c5c06602b11497caeb90ad58224ff1037ca6ff34c3d6380" Workload="srv--zbif7.gb1.brightbox.com-k8s-csi--node--driver--8qsmb-eth0" Mar 17 22:06:01.236987 env[1205]: 2025-03-17 22:06:01.211 [INFO][4415] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 22:06:01.236987 env[1205]: 2025-03-17 22:06:01.211 [INFO][4415] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 22:06:01.236987 env[1205]: 2025-03-17 22:06:01.227 [WARNING][4415] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="7b7de6ee875cb03d8c5c06602b11497caeb90ad58224ff1037ca6ff34c3d6380" HandleID="k8s-pod-network.7b7de6ee875cb03d8c5c06602b11497caeb90ad58224ff1037ca6ff34c3d6380" Workload="srv--zbif7.gb1.brightbox.com-k8s-csi--node--driver--8qsmb-eth0" Mar 17 22:06:01.236987 env[1205]: 2025-03-17 22:06:01.227 [INFO][4415] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="7b7de6ee875cb03d8c5c06602b11497caeb90ad58224ff1037ca6ff34c3d6380" HandleID="k8s-pod-network.7b7de6ee875cb03d8c5c06602b11497caeb90ad58224ff1037ca6ff34c3d6380" Workload="srv--zbif7.gb1.brightbox.com-k8s-csi--node--driver--8qsmb-eth0" Mar 17 22:06:01.236987 env[1205]: 2025-03-17 22:06:01.232 [INFO][4415] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 22:06:01.236987 env[1205]: 2025-03-17 22:06:01.234 [INFO][4408] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="7b7de6ee875cb03d8c5c06602b11497caeb90ad58224ff1037ca6ff34c3d6380" Mar 17 22:06:01.238970 env[1205]: time="2025-03-17T22:06:01.236947246Z" level=info msg="TearDown network for sandbox \"7b7de6ee875cb03d8c5c06602b11497caeb90ad58224ff1037ca6ff34c3d6380\" successfully" Mar 17 22:06:01.238970 env[1205]: time="2025-03-17T22:06:01.237954628Z" level=info msg="StopPodSandbox for \"7b7de6ee875cb03d8c5c06602b11497caeb90ad58224ff1037ca6ff34c3d6380\" returns successfully" Mar 17 22:06:01.239408 env[1205]: time="2025-03-17T22:06:01.239365247Z" level=info msg="RemovePodSandbox for \"7b7de6ee875cb03d8c5c06602b11497caeb90ad58224ff1037ca6ff34c3d6380\"" Mar 17 22:06:01.239733 env[1205]: time="2025-03-17T22:06:01.239598229Z" level=info msg="Forcibly stopping sandbox \"7b7de6ee875cb03d8c5c06602b11497caeb90ad58224ff1037ca6ff34c3d6380\"" Mar 17 22:06:01.368963 env[1205]: 2025-03-17 22:06:01.311 [WARNING][4433] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="7b7de6ee875cb03d8c5c06602b11497caeb90ad58224ff1037ca6ff34c3d6380" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--zbif7.gb1.brightbox.com-k8s-csi--node--driver--8qsmb-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"72a58b73-e5b8-4cf5-bcd4-e7ba6f464863", ResourceVersion:"897", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 22, 5, 13, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"84cddb44f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-zbif7.gb1.brightbox.com", ContainerID:"0893610d76e3664367dde23252a185830b00cabcf4b587817760b37e2db5fc44", Pod:"csi-node-driver-8qsmb", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.17.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"califfa9ffe3af9", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 22:06:01.368963 env[1205]: 2025-03-17 22:06:01.311 [INFO][4433] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="7b7de6ee875cb03d8c5c06602b11497caeb90ad58224ff1037ca6ff34c3d6380" Mar 17 22:06:01.368963 env[1205]: 2025-03-17 22:06:01.311 [INFO][4433] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="7b7de6ee875cb03d8c5c06602b11497caeb90ad58224ff1037ca6ff34c3d6380" iface="eth0" netns="" Mar 17 22:06:01.368963 env[1205]: 2025-03-17 22:06:01.311 [INFO][4433] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="7b7de6ee875cb03d8c5c06602b11497caeb90ad58224ff1037ca6ff34c3d6380" Mar 17 22:06:01.368963 env[1205]: 2025-03-17 22:06:01.311 [INFO][4433] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="7b7de6ee875cb03d8c5c06602b11497caeb90ad58224ff1037ca6ff34c3d6380" Mar 17 22:06:01.368963 env[1205]: 2025-03-17 22:06:01.353 [INFO][4439] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="7b7de6ee875cb03d8c5c06602b11497caeb90ad58224ff1037ca6ff34c3d6380" HandleID="k8s-pod-network.7b7de6ee875cb03d8c5c06602b11497caeb90ad58224ff1037ca6ff34c3d6380" Workload="srv--zbif7.gb1.brightbox.com-k8s-csi--node--driver--8qsmb-eth0" Mar 17 22:06:01.368963 env[1205]: 2025-03-17 22:06:01.354 [INFO][4439] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 22:06:01.368963 env[1205]: 2025-03-17 22:06:01.354 [INFO][4439] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 22:06:01.368963 env[1205]: 2025-03-17 22:06:01.362 [WARNING][4439] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="7b7de6ee875cb03d8c5c06602b11497caeb90ad58224ff1037ca6ff34c3d6380" HandleID="k8s-pod-network.7b7de6ee875cb03d8c5c06602b11497caeb90ad58224ff1037ca6ff34c3d6380" Workload="srv--zbif7.gb1.brightbox.com-k8s-csi--node--driver--8qsmb-eth0" Mar 17 22:06:01.368963 env[1205]: 2025-03-17 22:06:01.363 [INFO][4439] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="7b7de6ee875cb03d8c5c06602b11497caeb90ad58224ff1037ca6ff34c3d6380" HandleID="k8s-pod-network.7b7de6ee875cb03d8c5c06602b11497caeb90ad58224ff1037ca6ff34c3d6380" Workload="srv--zbif7.gb1.brightbox.com-k8s-csi--node--driver--8qsmb-eth0" Mar 17 22:06:01.368963 env[1205]: 2025-03-17 22:06:01.365 [INFO][4439] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 22:06:01.368963 env[1205]: 2025-03-17 22:06:01.367 [INFO][4433] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="7b7de6ee875cb03d8c5c06602b11497caeb90ad58224ff1037ca6ff34c3d6380" Mar 17 22:06:01.370265 env[1205]: time="2025-03-17T22:06:01.369023436Z" level=info msg="TearDown network for sandbox \"7b7de6ee875cb03d8c5c06602b11497caeb90ad58224ff1037ca6ff34c3d6380\" successfully" Mar 17 22:06:01.373583 env[1205]: time="2025-03-17T22:06:01.373493223Z" level=info msg="RemovePodSandbox \"7b7de6ee875cb03d8c5c06602b11497caeb90ad58224ff1037ca6ff34c3d6380\" returns successfully" Mar 17 22:06:01.374268 env[1205]: time="2025-03-17T22:06:01.374230535Z" level=info msg="StopPodSandbox for \"86a1255a92a9fb66a96092bff74e8535b80b4ff61972ceec62ee6fd36ddf9498\"" Mar 17 22:06:01.501976 env[1205]: 2025-03-17 22:06:01.445 [WARNING][4458] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="86a1255a92a9fb66a96092bff74e8535b80b4ff61972ceec62ee6fd36ddf9498" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--zbif7.gb1.brightbox.com-k8s-coredns--668d6bf9bc--hksfn-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"a82f42e7-3e9b-43f9-92e0-df21d942a638", ResourceVersion:"888", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 22, 5, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-zbif7.gb1.brightbox.com", ContainerID:"cbf73e6dcb57c0f5a9b23280ade2e64dd56509c963009ccd9fcd6ddc05957630", Pod:"coredns-668d6bf9bc-hksfn", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.17.70/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"califdf1ac91348", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 22:06:01.501976 env[1205]: 2025-03-17 22:06:01.446 [INFO][4458] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="86a1255a92a9fb66a96092bff74e8535b80b4ff61972ceec62ee6fd36ddf9498" Mar 17 22:06:01.501976 env[1205]: 2025-03-17 22:06:01.447 [INFO][4458] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="86a1255a92a9fb66a96092bff74e8535b80b4ff61972ceec62ee6fd36ddf9498" iface="eth0" netns="" Mar 17 22:06:01.501976 env[1205]: 2025-03-17 22:06:01.447 [INFO][4458] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="86a1255a92a9fb66a96092bff74e8535b80b4ff61972ceec62ee6fd36ddf9498" Mar 17 22:06:01.501976 env[1205]: 2025-03-17 22:06:01.447 [INFO][4458] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="86a1255a92a9fb66a96092bff74e8535b80b4ff61972ceec62ee6fd36ddf9498" Mar 17 22:06:01.501976 env[1205]: 2025-03-17 22:06:01.479 [INFO][4464] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="86a1255a92a9fb66a96092bff74e8535b80b4ff61972ceec62ee6fd36ddf9498" HandleID="k8s-pod-network.86a1255a92a9fb66a96092bff74e8535b80b4ff61972ceec62ee6fd36ddf9498" Workload="srv--zbif7.gb1.brightbox.com-k8s-coredns--668d6bf9bc--hksfn-eth0" Mar 17 22:06:01.501976 env[1205]: 2025-03-17 22:06:01.479 [INFO][4464] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 22:06:01.501976 env[1205]: 2025-03-17 22:06:01.479 [INFO][4464] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 22:06:01.501976 env[1205]: 2025-03-17 22:06:01.495 [WARNING][4464] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="86a1255a92a9fb66a96092bff74e8535b80b4ff61972ceec62ee6fd36ddf9498" HandleID="k8s-pod-network.86a1255a92a9fb66a96092bff74e8535b80b4ff61972ceec62ee6fd36ddf9498" Workload="srv--zbif7.gb1.brightbox.com-k8s-coredns--668d6bf9bc--hksfn-eth0" Mar 17 22:06:01.501976 env[1205]: 2025-03-17 22:06:01.495 [INFO][4464] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="86a1255a92a9fb66a96092bff74e8535b80b4ff61972ceec62ee6fd36ddf9498" HandleID="k8s-pod-network.86a1255a92a9fb66a96092bff74e8535b80b4ff61972ceec62ee6fd36ddf9498" Workload="srv--zbif7.gb1.brightbox.com-k8s-coredns--668d6bf9bc--hksfn-eth0" Mar 17 22:06:01.501976 env[1205]: 2025-03-17 22:06:01.497 [INFO][4464] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 22:06:01.501976 env[1205]: 2025-03-17 22:06:01.499 [INFO][4458] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="86a1255a92a9fb66a96092bff74e8535b80b4ff61972ceec62ee6fd36ddf9498" Mar 17 22:06:01.504120 env[1205]: time="2025-03-17T22:06:01.501926827Z" level=info msg="TearDown network for sandbox \"86a1255a92a9fb66a96092bff74e8535b80b4ff61972ceec62ee6fd36ddf9498\" successfully" Mar 17 22:06:01.504120 env[1205]: time="2025-03-17T22:06:01.503302691Z" level=info msg="StopPodSandbox for \"86a1255a92a9fb66a96092bff74e8535b80b4ff61972ceec62ee6fd36ddf9498\" returns successfully" Mar 17 22:06:01.504517 env[1205]: time="2025-03-17T22:06:01.504468769Z" level=info msg="RemovePodSandbox for \"86a1255a92a9fb66a96092bff74e8535b80b4ff61972ceec62ee6fd36ddf9498\"" Mar 17 22:06:01.504844 env[1205]: time="2025-03-17T22:06:01.504719598Z" level=info msg="Forcibly stopping sandbox \"86a1255a92a9fb66a96092bff74e8535b80b4ff61972ceec62ee6fd36ddf9498\"" Mar 17 22:06:01.627443 env[1205]: 2025-03-17 22:06:01.564 [WARNING][4482] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="86a1255a92a9fb66a96092bff74e8535b80b4ff61972ceec62ee6fd36ddf9498" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--zbif7.gb1.brightbox.com-k8s-coredns--668d6bf9bc--hksfn-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"a82f42e7-3e9b-43f9-92e0-df21d942a638", ResourceVersion:"888", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 22, 5, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-zbif7.gb1.brightbox.com", ContainerID:"cbf73e6dcb57c0f5a9b23280ade2e64dd56509c963009ccd9fcd6ddc05957630", Pod:"coredns-668d6bf9bc-hksfn", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.17.70/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"califdf1ac91348", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 22:06:01.627443 env[1205]: 2025-03-17 22:06:01.564 [INFO][4482] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="86a1255a92a9fb66a96092bff74e8535b80b4ff61972ceec62ee6fd36ddf9498" Mar 17 22:06:01.627443 env[1205]: 2025-03-17 22:06:01.564 [INFO][4482] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="86a1255a92a9fb66a96092bff74e8535b80b4ff61972ceec62ee6fd36ddf9498" iface="eth0" netns="" Mar 17 22:06:01.627443 env[1205]: 2025-03-17 22:06:01.564 [INFO][4482] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="86a1255a92a9fb66a96092bff74e8535b80b4ff61972ceec62ee6fd36ddf9498" Mar 17 22:06:01.627443 env[1205]: 2025-03-17 22:06:01.564 [INFO][4482] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="86a1255a92a9fb66a96092bff74e8535b80b4ff61972ceec62ee6fd36ddf9498" Mar 17 22:06:01.627443 env[1205]: 2025-03-17 22:06:01.597 [INFO][4488] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="86a1255a92a9fb66a96092bff74e8535b80b4ff61972ceec62ee6fd36ddf9498" HandleID="k8s-pod-network.86a1255a92a9fb66a96092bff74e8535b80b4ff61972ceec62ee6fd36ddf9498" Workload="srv--zbif7.gb1.brightbox.com-k8s-coredns--668d6bf9bc--hksfn-eth0" Mar 17 22:06:01.627443 env[1205]: 2025-03-17 22:06:01.597 [INFO][4488] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 22:06:01.627443 env[1205]: 2025-03-17 22:06:01.598 [INFO][4488] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 22:06:01.627443 env[1205]: 2025-03-17 22:06:01.610 [WARNING][4488] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="86a1255a92a9fb66a96092bff74e8535b80b4ff61972ceec62ee6fd36ddf9498" HandleID="k8s-pod-network.86a1255a92a9fb66a96092bff74e8535b80b4ff61972ceec62ee6fd36ddf9498" Workload="srv--zbif7.gb1.brightbox.com-k8s-coredns--668d6bf9bc--hksfn-eth0" Mar 17 22:06:01.627443 env[1205]: 2025-03-17 22:06:01.610 [INFO][4488] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="86a1255a92a9fb66a96092bff74e8535b80b4ff61972ceec62ee6fd36ddf9498" HandleID="k8s-pod-network.86a1255a92a9fb66a96092bff74e8535b80b4ff61972ceec62ee6fd36ddf9498" Workload="srv--zbif7.gb1.brightbox.com-k8s-coredns--668d6bf9bc--hksfn-eth0" Mar 17 22:06:01.627443 env[1205]: 2025-03-17 22:06:01.622 [INFO][4488] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 22:06:01.627443 env[1205]: 2025-03-17 22:06:01.625 [INFO][4482] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="86a1255a92a9fb66a96092bff74e8535b80b4ff61972ceec62ee6fd36ddf9498" Mar 17 22:06:01.629022 env[1205]: time="2025-03-17T22:06:01.627484699Z" level=info msg="TearDown network for sandbox \"86a1255a92a9fb66a96092bff74e8535b80b4ff61972ceec62ee6fd36ddf9498\" successfully" Mar 17 22:06:01.633731 env[1205]: time="2025-03-17T22:06:01.633593608Z" level=info msg="RemovePodSandbox \"86a1255a92a9fb66a96092bff74e8535b80b4ff61972ceec62ee6fd36ddf9498\" returns successfully" Mar 17 22:06:01.634445 env[1205]: time="2025-03-17T22:06:01.634405800Z" level=info msg="StopPodSandbox for \"94faf4a4aad38fb86162d25c57d5681e3f89b5073929530903b66db47c845f72\"" Mar 17 22:06:01.766242 env[1205]: 2025-03-17 22:06:01.714 [WARNING][4507] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="94faf4a4aad38fb86162d25c57d5681e3f89b5073929530903b66db47c845f72" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--zbif7.gb1.brightbox.com-k8s-calico--apiserver--9cf959fb7--6grpc-eth0", GenerateName:"calico-apiserver-9cf959fb7-", Namespace:"calico-apiserver", SelfLink:"", UID:"58155caf-9ac0-4f91-81aa-f85d1f16be02", ResourceVersion:"880", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 22, 5, 13, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"9cf959fb7", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-zbif7.gb1.brightbox.com", ContainerID:"0a42b9824783a104f971969eaf7d3117b7ff1b2dd02515b4fccce50a5b7688b8", Pod:"calico-apiserver-9cf959fb7-6grpc", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.17.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calib727b1bc4f5", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 22:06:01.766242 env[1205]: 2025-03-17 22:06:01.714 [INFO][4507] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="94faf4a4aad38fb86162d25c57d5681e3f89b5073929530903b66db47c845f72" Mar 17 22:06:01.766242 env[1205]: 2025-03-17 22:06:01.714 [INFO][4507] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="94faf4a4aad38fb86162d25c57d5681e3f89b5073929530903b66db47c845f72" iface="eth0" netns="" Mar 17 22:06:01.766242 env[1205]: 2025-03-17 22:06:01.714 [INFO][4507] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="94faf4a4aad38fb86162d25c57d5681e3f89b5073929530903b66db47c845f72" Mar 17 22:06:01.766242 env[1205]: 2025-03-17 22:06:01.714 [INFO][4507] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="94faf4a4aad38fb86162d25c57d5681e3f89b5073929530903b66db47c845f72" Mar 17 22:06:01.766242 env[1205]: 2025-03-17 22:06:01.748 [INFO][4513] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="94faf4a4aad38fb86162d25c57d5681e3f89b5073929530903b66db47c845f72" HandleID="k8s-pod-network.94faf4a4aad38fb86162d25c57d5681e3f89b5073929530903b66db47c845f72" Workload="srv--zbif7.gb1.brightbox.com-k8s-calico--apiserver--9cf959fb7--6grpc-eth0" Mar 17 22:06:01.766242 env[1205]: 2025-03-17 22:06:01.749 [INFO][4513] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 22:06:01.766242 env[1205]: 2025-03-17 22:06:01.749 [INFO][4513] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 22:06:01.766242 env[1205]: 2025-03-17 22:06:01.759 [WARNING][4513] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="94faf4a4aad38fb86162d25c57d5681e3f89b5073929530903b66db47c845f72" HandleID="k8s-pod-network.94faf4a4aad38fb86162d25c57d5681e3f89b5073929530903b66db47c845f72" Workload="srv--zbif7.gb1.brightbox.com-k8s-calico--apiserver--9cf959fb7--6grpc-eth0" Mar 17 22:06:01.766242 env[1205]: 2025-03-17 22:06:01.759 [INFO][4513] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="94faf4a4aad38fb86162d25c57d5681e3f89b5073929530903b66db47c845f72" HandleID="k8s-pod-network.94faf4a4aad38fb86162d25c57d5681e3f89b5073929530903b66db47c845f72" Workload="srv--zbif7.gb1.brightbox.com-k8s-calico--apiserver--9cf959fb7--6grpc-eth0" Mar 17 22:06:01.766242 env[1205]: 2025-03-17 22:06:01.762 [INFO][4513] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 22:06:01.766242 env[1205]: 2025-03-17 22:06:01.764 [INFO][4507] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="94faf4a4aad38fb86162d25c57d5681e3f89b5073929530903b66db47c845f72" Mar 17 22:06:01.768767 env[1205]: time="2025-03-17T22:06:01.768114859Z" level=info msg="TearDown network for sandbox \"94faf4a4aad38fb86162d25c57d5681e3f89b5073929530903b66db47c845f72\" successfully" Mar 17 22:06:01.768767 env[1205]: time="2025-03-17T22:06:01.768163027Z" level=info msg="StopPodSandbox for \"94faf4a4aad38fb86162d25c57d5681e3f89b5073929530903b66db47c845f72\" returns successfully" Mar 17 22:06:01.769921 env[1205]: time="2025-03-17T22:06:01.769856590Z" level=info msg="RemovePodSandbox for \"94faf4a4aad38fb86162d25c57d5681e3f89b5073929530903b66db47c845f72\"" Mar 17 22:06:01.770349 env[1205]: time="2025-03-17T22:06:01.770196938Z" level=info msg="Forcibly stopping sandbox \"94faf4a4aad38fb86162d25c57d5681e3f89b5073929530903b66db47c845f72\"" Mar 17 22:06:01.888881 env[1205]: 2025-03-17 22:06:01.835 [WARNING][4533] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="94faf4a4aad38fb86162d25c57d5681e3f89b5073929530903b66db47c845f72" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--zbif7.gb1.brightbox.com-k8s-calico--apiserver--9cf959fb7--6grpc-eth0", GenerateName:"calico-apiserver-9cf959fb7-", Namespace:"calico-apiserver", SelfLink:"", UID:"58155caf-9ac0-4f91-81aa-f85d1f16be02", ResourceVersion:"880", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 22, 5, 13, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"9cf959fb7", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-zbif7.gb1.brightbox.com", ContainerID:"0a42b9824783a104f971969eaf7d3117b7ff1b2dd02515b4fccce50a5b7688b8", Pod:"calico-apiserver-9cf959fb7-6grpc", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.17.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calib727b1bc4f5", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 22:06:01.888881 env[1205]: 2025-03-17 22:06:01.836 [INFO][4533] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="94faf4a4aad38fb86162d25c57d5681e3f89b5073929530903b66db47c845f72" Mar 17 22:06:01.888881 env[1205]: 2025-03-17 22:06:01.836 [INFO][4533] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="94faf4a4aad38fb86162d25c57d5681e3f89b5073929530903b66db47c845f72" iface="eth0" netns="" Mar 17 22:06:01.888881 env[1205]: 2025-03-17 22:06:01.836 [INFO][4533] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="94faf4a4aad38fb86162d25c57d5681e3f89b5073929530903b66db47c845f72" Mar 17 22:06:01.888881 env[1205]: 2025-03-17 22:06:01.836 [INFO][4533] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="94faf4a4aad38fb86162d25c57d5681e3f89b5073929530903b66db47c845f72" Mar 17 22:06:01.888881 env[1205]: 2025-03-17 22:06:01.872 [INFO][4539] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="94faf4a4aad38fb86162d25c57d5681e3f89b5073929530903b66db47c845f72" HandleID="k8s-pod-network.94faf4a4aad38fb86162d25c57d5681e3f89b5073929530903b66db47c845f72" Workload="srv--zbif7.gb1.brightbox.com-k8s-calico--apiserver--9cf959fb7--6grpc-eth0" Mar 17 22:06:01.888881 env[1205]: 2025-03-17 22:06:01.872 [INFO][4539] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 22:06:01.888881 env[1205]: 2025-03-17 22:06:01.872 [INFO][4539] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 22:06:01.888881 env[1205]: 2025-03-17 22:06:01.882 [WARNING][4539] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="94faf4a4aad38fb86162d25c57d5681e3f89b5073929530903b66db47c845f72" HandleID="k8s-pod-network.94faf4a4aad38fb86162d25c57d5681e3f89b5073929530903b66db47c845f72" Workload="srv--zbif7.gb1.brightbox.com-k8s-calico--apiserver--9cf959fb7--6grpc-eth0" Mar 17 22:06:01.888881 env[1205]: 2025-03-17 22:06:01.882 [INFO][4539] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="94faf4a4aad38fb86162d25c57d5681e3f89b5073929530903b66db47c845f72" HandleID="k8s-pod-network.94faf4a4aad38fb86162d25c57d5681e3f89b5073929530903b66db47c845f72" Workload="srv--zbif7.gb1.brightbox.com-k8s-calico--apiserver--9cf959fb7--6grpc-eth0" Mar 17 22:06:01.888881 env[1205]: 2025-03-17 22:06:01.885 [INFO][4539] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 22:06:01.888881 env[1205]: 2025-03-17 22:06:01.886 [INFO][4533] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="94faf4a4aad38fb86162d25c57d5681e3f89b5073929530903b66db47c845f72" Mar 17 22:06:01.888881 env[1205]: time="2025-03-17T22:06:01.888591024Z" level=info msg="TearDown network for sandbox \"94faf4a4aad38fb86162d25c57d5681e3f89b5073929530903b66db47c845f72\" successfully" Mar 17 22:06:01.895172 env[1205]: time="2025-03-17T22:06:01.895026195Z" level=info msg="RemovePodSandbox \"94faf4a4aad38fb86162d25c57d5681e3f89b5073929530903b66db47c845f72\" returns successfully" Mar 17 22:06:01.896194 env[1205]: time="2025-03-17T22:06:01.896154305Z" level=info msg="StopPodSandbox for \"cf4c0eaa1785fa59168f93484a1e2dd4677bccc48d9f9b0dc40a0c9b3798b080\"" Mar 17 22:06:02.006810 env[1205]: 2025-03-17 22:06:01.956 [WARNING][4557] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="cf4c0eaa1785fa59168f93484a1e2dd4677bccc48d9f9b0dc40a0c9b3798b080" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--zbif7.gb1.brightbox.com-k8s-calico--apiserver--9cf959fb7--wc2pd-eth0", GenerateName:"calico-apiserver-9cf959fb7-", Namespace:"calico-apiserver", SelfLink:"", UID:"6c786678-3d62-47ad-93a5-369b9da92261", ResourceVersion:"848", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 22, 5, 13, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"9cf959fb7", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-zbif7.gb1.brightbox.com", ContainerID:"c2e60aeef56d051dd5d8df49f29315b96f7b595d0a0efd6487fb1f7452307136", Pod:"calico-apiserver-9cf959fb7-wc2pd", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.17.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali7dbd006b3e8", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 22:06:02.006810 env[1205]: 2025-03-17 22:06:01.956 [INFO][4557] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="cf4c0eaa1785fa59168f93484a1e2dd4677bccc48d9f9b0dc40a0c9b3798b080" Mar 17 22:06:02.006810 env[1205]: 2025-03-17 22:06:01.956 [INFO][4557] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="cf4c0eaa1785fa59168f93484a1e2dd4677bccc48d9f9b0dc40a0c9b3798b080" iface="eth0" netns="" Mar 17 22:06:02.006810 env[1205]: 2025-03-17 22:06:01.956 [INFO][4557] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="cf4c0eaa1785fa59168f93484a1e2dd4677bccc48d9f9b0dc40a0c9b3798b080" Mar 17 22:06:02.006810 env[1205]: 2025-03-17 22:06:01.956 [INFO][4557] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="cf4c0eaa1785fa59168f93484a1e2dd4677bccc48d9f9b0dc40a0c9b3798b080" Mar 17 22:06:02.006810 env[1205]: 2025-03-17 22:06:01.990 [INFO][4563] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="cf4c0eaa1785fa59168f93484a1e2dd4677bccc48d9f9b0dc40a0c9b3798b080" HandleID="k8s-pod-network.cf4c0eaa1785fa59168f93484a1e2dd4677bccc48d9f9b0dc40a0c9b3798b080" Workload="srv--zbif7.gb1.brightbox.com-k8s-calico--apiserver--9cf959fb7--wc2pd-eth0" Mar 17 22:06:02.006810 env[1205]: 2025-03-17 22:06:01.990 [INFO][4563] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 22:06:02.006810 env[1205]: 2025-03-17 22:06:01.990 [INFO][4563] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 22:06:02.006810 env[1205]: 2025-03-17 22:06:02.000 [WARNING][4563] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="cf4c0eaa1785fa59168f93484a1e2dd4677bccc48d9f9b0dc40a0c9b3798b080" HandleID="k8s-pod-network.cf4c0eaa1785fa59168f93484a1e2dd4677bccc48d9f9b0dc40a0c9b3798b080" Workload="srv--zbif7.gb1.brightbox.com-k8s-calico--apiserver--9cf959fb7--wc2pd-eth0" Mar 17 22:06:02.006810 env[1205]: 2025-03-17 22:06:02.000 [INFO][4563] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="cf4c0eaa1785fa59168f93484a1e2dd4677bccc48d9f9b0dc40a0c9b3798b080" HandleID="k8s-pod-network.cf4c0eaa1785fa59168f93484a1e2dd4677bccc48d9f9b0dc40a0c9b3798b080" Workload="srv--zbif7.gb1.brightbox.com-k8s-calico--apiserver--9cf959fb7--wc2pd-eth0" Mar 17 22:06:02.006810 env[1205]: 2025-03-17 22:06:02.003 [INFO][4563] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 22:06:02.006810 env[1205]: 2025-03-17 22:06:02.004 [INFO][4557] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="cf4c0eaa1785fa59168f93484a1e2dd4677bccc48d9f9b0dc40a0c9b3798b080" Mar 17 22:06:02.008226 env[1205]: time="2025-03-17T22:06:02.007352005Z" level=info msg="TearDown network for sandbox \"cf4c0eaa1785fa59168f93484a1e2dd4677bccc48d9f9b0dc40a0c9b3798b080\" successfully" Mar 17 22:06:02.008226 env[1205]: time="2025-03-17T22:06:02.007401037Z" level=info msg="StopPodSandbox for \"cf4c0eaa1785fa59168f93484a1e2dd4677bccc48d9f9b0dc40a0c9b3798b080\" returns successfully" Mar 17 22:06:02.008358 env[1205]: time="2025-03-17T22:06:02.008189098Z" level=info msg="RemovePodSandbox for \"cf4c0eaa1785fa59168f93484a1e2dd4677bccc48d9f9b0dc40a0c9b3798b080\"" Mar 17 22:06:02.008358 env[1205]: time="2025-03-17T22:06:02.008267071Z" level=info msg="Forcibly stopping sandbox \"cf4c0eaa1785fa59168f93484a1e2dd4677bccc48d9f9b0dc40a0c9b3798b080\"" Mar 17 22:06:02.134773 env[1205]: 2025-03-17 22:06:02.081 [WARNING][4582] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="cf4c0eaa1785fa59168f93484a1e2dd4677bccc48d9f9b0dc40a0c9b3798b080" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--zbif7.gb1.brightbox.com-k8s-calico--apiserver--9cf959fb7--wc2pd-eth0", GenerateName:"calico-apiserver-9cf959fb7-", Namespace:"calico-apiserver", SelfLink:"", UID:"6c786678-3d62-47ad-93a5-369b9da92261", ResourceVersion:"848", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 22, 5, 13, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"9cf959fb7", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-zbif7.gb1.brightbox.com", ContainerID:"c2e60aeef56d051dd5d8df49f29315b96f7b595d0a0efd6487fb1f7452307136", Pod:"calico-apiserver-9cf959fb7-wc2pd", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.17.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali7dbd006b3e8", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 22:06:02.134773 env[1205]: 2025-03-17 22:06:02.082 [INFO][4582] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="cf4c0eaa1785fa59168f93484a1e2dd4677bccc48d9f9b0dc40a0c9b3798b080" Mar 17 22:06:02.134773 env[1205]: 2025-03-17 22:06:02.082 [INFO][4582] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="cf4c0eaa1785fa59168f93484a1e2dd4677bccc48d9f9b0dc40a0c9b3798b080" iface="eth0" netns="" Mar 17 22:06:02.134773 env[1205]: 2025-03-17 22:06:02.082 [INFO][4582] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="cf4c0eaa1785fa59168f93484a1e2dd4677bccc48d9f9b0dc40a0c9b3798b080" Mar 17 22:06:02.134773 env[1205]: 2025-03-17 22:06:02.082 [INFO][4582] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="cf4c0eaa1785fa59168f93484a1e2dd4677bccc48d9f9b0dc40a0c9b3798b080" Mar 17 22:06:02.134773 env[1205]: 2025-03-17 22:06:02.112 [INFO][4588] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="cf4c0eaa1785fa59168f93484a1e2dd4677bccc48d9f9b0dc40a0c9b3798b080" HandleID="k8s-pod-network.cf4c0eaa1785fa59168f93484a1e2dd4677bccc48d9f9b0dc40a0c9b3798b080" Workload="srv--zbif7.gb1.brightbox.com-k8s-calico--apiserver--9cf959fb7--wc2pd-eth0" Mar 17 22:06:02.134773 env[1205]: 2025-03-17 22:06:02.112 [INFO][4588] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 22:06:02.134773 env[1205]: 2025-03-17 22:06:02.112 [INFO][4588] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 22:06:02.134773 env[1205]: 2025-03-17 22:06:02.125 [WARNING][4588] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="cf4c0eaa1785fa59168f93484a1e2dd4677bccc48d9f9b0dc40a0c9b3798b080" HandleID="k8s-pod-network.cf4c0eaa1785fa59168f93484a1e2dd4677bccc48d9f9b0dc40a0c9b3798b080" Workload="srv--zbif7.gb1.brightbox.com-k8s-calico--apiserver--9cf959fb7--wc2pd-eth0" Mar 17 22:06:02.134773 env[1205]: 2025-03-17 22:06:02.125 [INFO][4588] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="cf4c0eaa1785fa59168f93484a1e2dd4677bccc48d9f9b0dc40a0c9b3798b080" HandleID="k8s-pod-network.cf4c0eaa1785fa59168f93484a1e2dd4677bccc48d9f9b0dc40a0c9b3798b080" Workload="srv--zbif7.gb1.brightbox.com-k8s-calico--apiserver--9cf959fb7--wc2pd-eth0" Mar 17 22:06:02.134773 env[1205]: 2025-03-17 22:06:02.130 [INFO][4588] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 22:06:02.134773 env[1205]: 2025-03-17 22:06:02.132 [INFO][4582] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="cf4c0eaa1785fa59168f93484a1e2dd4677bccc48d9f9b0dc40a0c9b3798b080" Mar 17 22:06:02.137449 env[1205]: time="2025-03-17T22:06:02.136629690Z" level=info msg="TearDown network for sandbox \"cf4c0eaa1785fa59168f93484a1e2dd4677bccc48d9f9b0dc40a0c9b3798b080\" successfully" Mar 17 22:06:02.143782 env[1205]: time="2025-03-17T22:06:02.143709071Z" level=info msg="RemovePodSandbox \"cf4c0eaa1785fa59168f93484a1e2dd4677bccc48d9f9b0dc40a0c9b3798b080\" returns successfully" Mar 17 22:06:02.145023 env[1205]: time="2025-03-17T22:06:02.144934314Z" level=info msg="StopPodSandbox for \"84663afd621e7b0c4c243d86e5ea066a007eb77478f0a01766ef588875860094\"" Mar 17 22:06:02.271806 env[1205]: 2025-03-17 22:06:02.218 [WARNING][4606] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="84663afd621e7b0c4c243d86e5ea066a007eb77478f0a01766ef588875860094" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--zbif7.gb1.brightbox.com-k8s-coredns--668d6bf9bc--67bbv-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"630555ef-bf08-4b1a-91a4-a1ce8eafa62c", ResourceVersion:"832", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 22, 5, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-zbif7.gb1.brightbox.com", ContainerID:"3e54fb9b9b8f5eb48f4eafa4b57401ec7b51f6298d3c1a147ffee5c595c957bb", Pod:"coredns-668d6bf9bc-67bbv", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.17.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali2317cd5da48", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 22:06:02.271806 env[1205]: 2025-03-17 22:06:02.219 [INFO][4606] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="84663afd621e7b0c4c243d86e5ea066a007eb77478f0a01766ef588875860094" Mar 17 22:06:02.271806 env[1205]: 2025-03-17 22:06:02.219 [INFO][4606] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="84663afd621e7b0c4c243d86e5ea066a007eb77478f0a01766ef588875860094" iface="eth0" netns="" Mar 17 22:06:02.271806 env[1205]: 2025-03-17 22:06:02.219 [INFO][4606] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="84663afd621e7b0c4c243d86e5ea066a007eb77478f0a01766ef588875860094" Mar 17 22:06:02.271806 env[1205]: 2025-03-17 22:06:02.219 [INFO][4606] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="84663afd621e7b0c4c243d86e5ea066a007eb77478f0a01766ef588875860094" Mar 17 22:06:02.271806 env[1205]: 2025-03-17 22:06:02.254 [INFO][4612] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="84663afd621e7b0c4c243d86e5ea066a007eb77478f0a01766ef588875860094" HandleID="k8s-pod-network.84663afd621e7b0c4c243d86e5ea066a007eb77478f0a01766ef588875860094" Workload="srv--zbif7.gb1.brightbox.com-k8s-coredns--668d6bf9bc--67bbv-eth0" Mar 17 22:06:02.271806 env[1205]: 2025-03-17 22:06:02.254 [INFO][4612] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 22:06:02.271806 env[1205]: 2025-03-17 22:06:02.254 [INFO][4612] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 22:06:02.271806 env[1205]: 2025-03-17 22:06:02.264 [WARNING][4612] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="84663afd621e7b0c4c243d86e5ea066a007eb77478f0a01766ef588875860094" HandleID="k8s-pod-network.84663afd621e7b0c4c243d86e5ea066a007eb77478f0a01766ef588875860094" Workload="srv--zbif7.gb1.brightbox.com-k8s-coredns--668d6bf9bc--67bbv-eth0" Mar 17 22:06:02.271806 env[1205]: 2025-03-17 22:06:02.264 [INFO][4612] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="84663afd621e7b0c4c243d86e5ea066a007eb77478f0a01766ef588875860094" HandleID="k8s-pod-network.84663afd621e7b0c4c243d86e5ea066a007eb77478f0a01766ef588875860094" Workload="srv--zbif7.gb1.brightbox.com-k8s-coredns--668d6bf9bc--67bbv-eth0" Mar 17 22:06:02.271806 env[1205]: 2025-03-17 22:06:02.267 [INFO][4612] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 22:06:02.271806 env[1205]: 2025-03-17 22:06:02.269 [INFO][4606] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="84663afd621e7b0c4c243d86e5ea066a007eb77478f0a01766ef588875860094" Mar 17 22:06:02.273392 env[1205]: time="2025-03-17T22:06:02.273325498Z" level=info msg="TearDown network for sandbox \"84663afd621e7b0c4c243d86e5ea066a007eb77478f0a01766ef588875860094\" successfully" Mar 17 22:06:02.273635 env[1205]: time="2025-03-17T22:06:02.273535380Z" level=info msg="StopPodSandbox for \"84663afd621e7b0c4c243d86e5ea066a007eb77478f0a01766ef588875860094\" returns successfully" Mar 17 22:06:02.274403 env[1205]: time="2025-03-17T22:06:02.274367350Z" level=info msg="RemovePodSandbox for \"84663afd621e7b0c4c243d86e5ea066a007eb77478f0a01766ef588875860094\"" Mar 17 22:06:02.274819 env[1205]: time="2025-03-17T22:06:02.274759387Z" level=info msg="Forcibly stopping sandbox \"84663afd621e7b0c4c243d86e5ea066a007eb77478f0a01766ef588875860094\"" Mar 17 22:06:02.463316 env[1205]: 2025-03-17 22:06:02.394 [WARNING][4632] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="84663afd621e7b0c4c243d86e5ea066a007eb77478f0a01766ef588875860094" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--zbif7.gb1.brightbox.com-k8s-coredns--668d6bf9bc--67bbv-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"630555ef-bf08-4b1a-91a4-a1ce8eafa62c", ResourceVersion:"832", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 22, 5, 4, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-zbif7.gb1.brightbox.com", ContainerID:"3e54fb9b9b8f5eb48f4eafa4b57401ec7b51f6298d3c1a147ffee5c595c957bb", Pod:"coredns-668d6bf9bc-67bbv", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.17.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali2317cd5da48", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 22:06:02.463316 env[1205]: 2025-03-17 22:06:02.394 [INFO][4632] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="84663afd621e7b0c4c243d86e5ea066a007eb77478f0a01766ef588875860094" Mar 17 22:06:02.463316 env[1205]: 2025-03-17 22:06:02.394 [INFO][4632] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="84663afd621e7b0c4c243d86e5ea066a007eb77478f0a01766ef588875860094" iface="eth0" netns="" Mar 17 22:06:02.463316 env[1205]: 2025-03-17 22:06:02.394 [INFO][4632] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="84663afd621e7b0c4c243d86e5ea066a007eb77478f0a01766ef588875860094" Mar 17 22:06:02.463316 env[1205]: 2025-03-17 22:06:02.394 [INFO][4632] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="84663afd621e7b0c4c243d86e5ea066a007eb77478f0a01766ef588875860094" Mar 17 22:06:02.463316 env[1205]: 2025-03-17 22:06:02.447 [INFO][4638] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="84663afd621e7b0c4c243d86e5ea066a007eb77478f0a01766ef588875860094" HandleID="k8s-pod-network.84663afd621e7b0c4c243d86e5ea066a007eb77478f0a01766ef588875860094" Workload="srv--zbif7.gb1.brightbox.com-k8s-coredns--668d6bf9bc--67bbv-eth0" Mar 17 22:06:02.463316 env[1205]: 2025-03-17 22:06:02.447 [INFO][4638] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 22:06:02.463316 env[1205]: 2025-03-17 22:06:02.447 [INFO][4638] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 22:06:02.463316 env[1205]: 2025-03-17 22:06:02.456 [WARNING][4638] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="84663afd621e7b0c4c243d86e5ea066a007eb77478f0a01766ef588875860094" HandleID="k8s-pod-network.84663afd621e7b0c4c243d86e5ea066a007eb77478f0a01766ef588875860094" Workload="srv--zbif7.gb1.brightbox.com-k8s-coredns--668d6bf9bc--67bbv-eth0" Mar 17 22:06:02.463316 env[1205]: 2025-03-17 22:06:02.456 [INFO][4638] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="84663afd621e7b0c4c243d86e5ea066a007eb77478f0a01766ef588875860094" HandleID="k8s-pod-network.84663afd621e7b0c4c243d86e5ea066a007eb77478f0a01766ef588875860094" Workload="srv--zbif7.gb1.brightbox.com-k8s-coredns--668d6bf9bc--67bbv-eth0" Mar 17 22:06:02.463316 env[1205]: 2025-03-17 22:06:02.459 [INFO][4638] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 22:06:02.463316 env[1205]: 2025-03-17 22:06:02.461 [INFO][4632] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="84663afd621e7b0c4c243d86e5ea066a007eb77478f0a01766ef588875860094" Mar 17 22:06:02.464412 env[1205]: time="2025-03-17T22:06:02.463360513Z" level=info msg="TearDown network for sandbox \"84663afd621e7b0c4c243d86e5ea066a007eb77478f0a01766ef588875860094\" successfully" Mar 17 22:06:02.467994 env[1205]: time="2025-03-17T22:06:02.467929925Z" level=info msg="RemovePodSandbox \"84663afd621e7b0c4c243d86e5ea066a007eb77478f0a01766ef588875860094\" returns successfully" Mar 17 22:06:05.231079 systemd[1]: Started sshd@24-10.244.26.146:22-143.110.184.217:37586.service. Mar 17 22:06:05.243490 kernel: kauditd_printk_skb: 54 callbacks suppressed Mar 17 22:06:05.243711 kernel: audit: type=1130 audit(1742249165.229:1397): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.244.26.146:22-143.110.184.217:37586 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:06:05.229000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.244.26.146:22-143.110.184.217:37586 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:06:05.938690 sshd[4647]: Invalid user redis from 143.110.184.217 port 37586 Mar 17 22:06:06.064957 kubelet[2045]: I0317 22:06:06.064897 2045 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Mar 17 22:06:06.116839 sshd[4647]: pam_faillock(sshd:auth): User unknown Mar 17 22:06:06.119137 sshd[4647]: pam_unix(sshd:auth): check pass; user unknown Mar 17 22:06:06.119222 sshd[4647]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.110.184.217 Mar 17 22:06:06.119000 audit[4647]: USER_AUTH pid=4647 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="redis" exe="/usr/sbin/sshd" hostname=143.110.184.217 addr=143.110.184.217 terminal=ssh res=failed' Mar 17 22:06:06.131699 kernel: audit: type=1100 audit(1742249166.119:1398): pid=4647 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="redis" exe="/usr/sbin/sshd" hostname=143.110.184.217 addr=143.110.184.217 terminal=ssh res=failed' Mar 17 22:06:06.120446 sshd[4647]: pam_faillock(sshd:auth): User unknown Mar 17 22:06:06.190000 audit[4652]: NETFILTER_CFG table=filter:114 family=2 entries=9 op=nft_register_rule pid=4652 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 22:06:06.198007 kernel: audit: type=1325 audit(1742249166.190:1399): table=filter:114 family=2 entries=9 op=nft_register_rule pid=4652 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 22:06:06.190000 audit[4652]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffccb178c20 a2=0 a3=7ffccb178c0c items=0 ppid=2206 pid=4652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:06:06.207578 kernel: audit: type=1300 audit(1742249166.190:1399): arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffccb178c20 a2=0 a3=7ffccb178c0c items=0 ppid=2206 pid=4652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:06:06.190000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 22:06:06.216707 kernel: audit: type=1327 audit(1742249166.190:1399): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 22:06:06.198000 audit[4652]: NETFILTER_CFG table=nat:115 family=2 entries=27 op=nft_register_chain pid=4652 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 22:06:06.232499 kernel: audit: type=1325 audit(1742249166.198:1400): table=nat:115 family=2 entries=27 op=nft_register_chain pid=4652 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 22:06:06.232685 kernel: audit: type=1300 audit(1742249166.198:1400): arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffccb178c20 a2=0 a3=7ffccb178c0c items=0 ppid=2206 pid=4652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:06:06.198000 audit[4652]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffccb178c20 a2=0 a3=7ffccb178c0c items=0 ppid=2206 pid=4652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:06:06.198000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 22:06:06.237590 kernel: audit: type=1327 audit(1742249166.198:1400): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 22:06:07.776232 sshd[4647]: Failed password for invalid user redis from 143.110.184.217 port 37586 ssh2 Mar 17 22:06:08.867293 sshd[4647]: Connection closed by invalid user redis 143.110.184.217 port 37586 [preauth] Mar 17 22:06:08.867000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.244.26.146:22-143.110.184.217:37586 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:06:08.868636 systemd[1]: sshd@24-10.244.26.146:22-143.110.184.217:37586.service: Deactivated successfully. Mar 17 22:06:08.880283 kernel: audit: type=1131 audit(1742249168.867:1401): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.244.26.146:22-143.110.184.217:37586 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:06:14.325255 systemd[1]: Started sshd@25-10.244.26.146:22-139.178.89.65:44060.service. Mar 17 22:06:14.323000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.244.26.146:22-139.178.89.65:44060 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:06:14.337577 kernel: audit: type=1130 audit(1742249174.323:1402): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.244.26.146:22-139.178.89.65:44060 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:06:15.332229 sshd[4689]: Accepted publickey for core from 139.178.89.65 port 44060 ssh2: RSA SHA256:zyhiPLENj58svNToN4BOPPS+na2TgK0IE73Z79n4eiY Mar 17 22:06:15.330000 audit[4689]: USER_ACCT pid=4689 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:06:15.343867 kernel: audit: type=1101 audit(1742249175.330:1403): pid=4689 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:06:15.346798 sshd[4689]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 22:06:15.342000 audit[4689]: CRED_ACQ pid=4689 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:06:15.354741 kernel: audit: type=1103 audit(1742249175.342:1404): pid=4689 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:06:15.355498 kernel: audit: type=1006 audit(1742249175.342:1405): pid=4689 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Mar 17 22:06:15.342000 audit[4689]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe696b71e0 a2=3 a3=0 items=0 ppid=1 pid=4689 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:06:15.365999 kernel: audit: type=1300 audit(1742249175.342:1405): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe696b71e0 a2=3 a3=0 items=0 ppid=1 pid=4689 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:06:15.366255 kernel: audit: type=1327 audit(1742249175.342:1405): proctitle=737368643A20636F7265205B707269765D Mar 17 22:06:15.342000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Mar 17 22:06:15.389861 systemd-logind[1193]: New session 10 of user core. Mar 17 22:06:15.395049 systemd[1]: Started session-10.scope. Mar 17 22:06:15.422215 kernel: audit: type=1105 audit(1742249175.411:1406): pid=4689 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:06:15.411000 audit[4689]: USER_START pid=4689 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:06:15.422000 audit[4691]: CRED_ACQ pid=4691 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:06:15.430612 kernel: audit: type=1103 audit(1742249175.422:1407): pid=4691 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:06:15.586159 kubelet[2045]: I0317 22:06:15.586021 2045 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Mar 17 22:06:15.713000 audit[4695]: NETFILTER_CFG table=filter:116 family=2 entries=8 op=nft_register_rule pid=4695 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 22:06:15.713000 audit[4695]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffca8983c00 a2=0 a3=7ffca8983bec items=0 ppid=2206 pid=4695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:06:15.729784 kernel: audit: type=1325 audit(1742249175.713:1408): table=filter:116 family=2 entries=8 op=nft_register_rule pid=4695 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 22:06:15.730041 kernel: audit: type=1300 audit(1742249175.713:1408): arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffca8983c00 a2=0 a3=7ffca8983bec items=0 ppid=2206 pid=4695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:06:15.713000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 22:06:15.732000 audit[4695]: NETFILTER_CFG table=nat:117 family=2 entries=34 op=nft_register_chain pid=4695 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 22:06:15.732000 audit[4695]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffca8983c00 a2=0 a3=7ffca8983bec items=0 ppid=2206 pid=4695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:06:15.732000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 22:06:15.761000 audit[4697]: NETFILTER_CFG table=filter:118 family=2 entries=8 op=nft_register_rule pid=4697 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 22:06:15.761000 audit[4697]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffdfac32000 a2=0 a3=7ffdfac31fec items=0 ppid=2206 pid=4697 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:06:15.761000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 22:06:15.766000 audit[4697]: NETFILTER_CFG table=nat:119 family=2 entries=34 op=nft_unregister_chain pid=4697 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 22:06:15.766000 audit[4697]: SYSCALL arch=c000003e syscall=46 success=yes exit=9476 a0=3 a1=7ffdfac32000 a2=0 a3=7ffdfac31fec items=0 ppid=2206 pid=4697 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:06:15.766000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 22:06:15.889000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.244.26.146:22-143.110.184.217:58112 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:06:15.890992 systemd[1]: Started sshd@26-10.244.26.146:22-143.110.184.217:58112.service. Mar 17 22:06:15.974368 systemd[1]: run-containerd-runc-k8s.io-08c5c45eae9aba2a56359dea30e909a27076c5c8abf4308aaf72f714e90fc123-runc.dargTs.mount: Deactivated successfully. Mar 17 22:06:16.811000 audit[4729]: NETFILTER_CFG table=filter:120 family=2 entries=8 op=nft_register_rule pid=4729 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 22:06:16.811000 audit[4729]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffdc7c425b0 a2=0 a3=7ffdc7c4259c items=0 ppid=2206 pid=4729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:06:16.811000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 22:06:16.818000 audit[4729]: NETFILTER_CFG table=nat:121 family=2 entries=34 op=nft_register_chain pid=4729 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 22:06:16.818000 audit[4729]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffdc7c425b0 a2=0 a3=7ffdc7c4259c items=0 ppid=2206 pid=4729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:06:16.818000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 22:06:16.927197 sshd[4704]: Invalid user samba from 143.110.184.217 port 58112 Mar 17 22:06:17.153633 sshd[4704]: pam_faillock(sshd:auth): User unknown Mar 17 22:06:17.154517 sshd[4704]: pam_unix(sshd:auth): check pass; user unknown Mar 17 22:06:17.154600 sshd[4704]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.110.184.217 Mar 17 22:06:17.155424 sshd[4704]: pam_faillock(sshd:auth): User unknown Mar 17 22:06:17.154000 audit[4704]: USER_AUTH pid=4704 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="samba" exe="/usr/sbin/sshd" hostname=143.110.184.217 addr=143.110.184.217 terminal=ssh res=failed' Mar 17 22:06:17.172054 sshd[4689]: pam_unix(sshd:session): session closed for user core Mar 17 22:06:17.173000 audit[4689]: USER_END pid=4689 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:06:17.173000 audit[4689]: CRED_DISP pid=4689 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:06:17.179083 systemd[1]: sshd@25-10.244.26.146:22-139.178.89.65:44060.service: Deactivated successfully. Mar 17 22:06:17.178000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.244.26.146:22-139.178.89.65:44060 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:06:17.182395 systemd[1]: session-10.scope: Deactivated successfully. Mar 17 22:06:17.186173 systemd-logind[1193]: Session 10 logged out. Waiting for processes to exit. Mar 17 22:06:17.190065 systemd-logind[1193]: Removed session 10. Mar 17 22:06:18.976214 sshd[4704]: Failed password for invalid user samba from 143.110.184.217 port 58112 ssh2 Mar 17 22:06:20.798595 sshd[4704]: Connection closed by invalid user samba 143.110.184.217 port 58112 [preauth] Mar 17 22:06:20.800973 systemd[1]: sshd@26-10.244.26.146:22-143.110.184.217:58112.service: Deactivated successfully. Mar 17 22:06:20.799000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.244.26.146:22-143.110.184.217:58112 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:06:20.807389 kernel: kauditd_printk_skb: 21 callbacks suppressed Mar 17 22:06:20.810183 kernel: audit: type=1131 audit(1742249180.799:1419): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.244.26.146:22-143.110.184.217:58112 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:06:22.341587 systemd[1]: Started sshd@27-10.244.26.146:22-139.178.89.65:42398.service. Mar 17 22:06:22.340000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-10.244.26.146:22-139.178.89.65:42398 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:06:22.349597 kernel: audit: type=1130 audit(1742249182.340:1420): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-10.244.26.146:22-139.178.89.65:42398 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:06:23.231000 audit[4737]: USER_ACCT pid=4737 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:06:23.243715 kernel: audit: type=1101 audit(1742249183.231:1421): pid=4737 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:06:23.243860 sshd[4737]: Accepted publickey for core from 139.178.89.65 port 42398 ssh2: RSA SHA256:zyhiPLENj58svNToN4BOPPS+na2TgK0IE73Z79n4eiY Mar 17 22:06:23.242000 audit[4737]: CRED_ACQ pid=4737 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:06:23.262608 kernel: audit: type=1103 audit(1742249183.242:1422): pid=4737 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:06:23.262812 kernel: audit: type=1006 audit(1742249183.242:1423): pid=4737 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 Mar 17 22:06:23.262878 kernel: audit: type=1300 audit(1742249183.242:1423): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffea20b470 a2=3 a3=0 items=0 ppid=1 pid=4737 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:06:23.242000 audit[4737]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffea20b470 a2=3 a3=0 items=0 ppid=1 pid=4737 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:06:23.254582 sshd[4737]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 22:06:23.242000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Mar 17 22:06:23.286449 kernel: audit: type=1327 audit(1742249183.242:1423): proctitle=737368643A20636F7265205B707269765D Mar 17 22:06:23.297841 systemd-logind[1193]: New session 11 of user core. Mar 17 22:06:23.298512 systemd[1]: Started session-11.scope. Mar 17 22:06:23.306000 audit[4737]: USER_START pid=4737 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:06:23.313000 audit[4739]: CRED_ACQ pid=4739 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:06:23.324880 kernel: audit: type=1105 audit(1742249183.306:1424): pid=4737 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:06:23.325688 kernel: audit: type=1103 audit(1742249183.313:1425): pid=4739 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:06:24.010801 sshd[4737]: pam_unix(sshd:session): session closed for user core Mar 17 22:06:24.014000 audit[4737]: USER_END pid=4737 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:06:24.031592 kernel: audit: type=1106 audit(1742249184.014:1426): pid=4737 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:06:24.028000 audit[4737]: CRED_DISP pid=4737 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:06:24.032673 systemd[1]: sshd@27-10.244.26.146:22-139.178.89.65:42398.service: Deactivated successfully. Mar 17 22:06:24.031000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-10.244.26.146:22-139.178.89.65:42398 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:06:24.034266 systemd[1]: session-11.scope: Deactivated successfully. Mar 17 22:06:24.038329 systemd-logind[1193]: Session 11 logged out. Waiting for processes to exit. Mar 17 22:06:24.040221 systemd-logind[1193]: Removed session 11. Mar 17 22:06:26.475392 systemd[1]: Started sshd@28-10.244.26.146:22-143.110.184.217:44100.service. Mar 17 22:06:26.475000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-10.244.26.146:22-143.110.184.217:44100 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:06:26.483025 kernel: kauditd_printk_skb: 2 callbacks suppressed Mar 17 22:06:26.483154 kernel: audit: type=1130 audit(1742249186.475:1429): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-10.244.26.146:22-143.110.184.217:44100 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:06:26.826000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-10.244.26.146:22-103.212.211.155:40962 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:06:26.827529 systemd[1]: Started sshd@29-10.244.26.146:22-103.212.211.155:40962.service. Mar 17 22:06:26.834620 kernel: audit: type=1130 audit(1742249186.826:1430): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-10.244.26.146:22-103.212.211.155:40962 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:06:27.344795 sshd[4750]: Invalid user vnc from 143.110.184.217 port 44100 Mar 17 22:06:27.647128 sshd[4750]: pam_faillock(sshd:auth): User unknown Mar 17 22:06:27.649270 sshd[4750]: pam_unix(sshd:auth): check pass; user unknown Mar 17 22:06:27.649344 sshd[4750]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.110.184.217 Mar 17 22:06:27.649000 audit[4750]: USER_AUTH pid=4750 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="vnc" exe="/usr/sbin/sshd" hostname=143.110.184.217 addr=143.110.184.217 terminal=ssh res=failed' Mar 17 22:06:27.650741 sshd[4750]: pam_faillock(sshd:auth): User unknown Mar 17 22:06:27.662146 kernel: audit: type=1100 audit(1742249187.649:1431): pid=4750 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="vnc" exe="/usr/sbin/sshd" hostname=143.110.184.217 addr=143.110.184.217 terminal=ssh res=failed' Mar 17 22:06:28.053251 systemd[1]: run-containerd-runc-k8s.io-b6b143babede96ab4cc2a0d50e25a04455503651f3bcbafebe0dec63df22d948-runc.UHtSgi.mount: Deactivated successfully. Mar 17 22:06:29.160717 systemd[1]: Started sshd@30-10.244.26.146:22-139.178.89.65:42412.service. Mar 17 22:06:29.160000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-10.244.26.146:22-139.178.89.65:42412 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:06:29.169601 kernel: audit: type=1130 audit(1742249189.160:1432): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-10.244.26.146:22-139.178.89.65:42412 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:06:29.424703 sshd[4753]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.212.211.155 user=root Mar 17 22:06:29.424000 audit[4753]: USER_AUTH pid=4753 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=103.212.211.155 addr=103.212.211.155 terminal=ssh res=failed' Mar 17 22:06:29.436596 kernel: audit: type=1100 audit(1742249189.424:1433): pid=4753 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=103.212.211.155 addr=103.212.211.155 terminal=ssh res=failed' Mar 17 22:06:29.522012 sshd[4750]: Failed password for invalid user vnc from 143.110.184.217 port 44100 ssh2 Mar 17 22:06:29.777442 sshd[4750]: Connection closed by invalid user vnc 143.110.184.217 port 44100 [preauth] Mar 17 22:06:29.778512 systemd[1]: sshd@28-10.244.26.146:22-143.110.184.217:44100.service: Deactivated successfully. Mar 17 22:06:29.789287 kernel: audit: type=1131 audit(1742249189.777:1434): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-10.244.26.146:22-143.110.184.217:44100 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:06:29.777000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-10.244.26.146:22-143.110.184.217:44100 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:06:30.060273 sshd[4775]: Accepted publickey for core from 139.178.89.65 port 42412 ssh2: RSA SHA256:zyhiPLENj58svNToN4BOPPS+na2TgK0IE73Z79n4eiY Mar 17 22:06:30.068710 kernel: audit: type=1101 audit(1742249190.058:1435): pid=4775 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:06:30.058000 audit[4775]: USER_ACCT pid=4775 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:06:30.069209 sshd[4775]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 22:06:30.059000 audit[4775]: CRED_ACQ pid=4775 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:06:30.076582 kernel: audit: type=1103 audit(1742249190.059:1436): pid=4775 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:06:30.081582 kernel: audit: type=1006 audit(1742249190.059:1437): pid=4775 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=12 res=1 Mar 17 22:06:30.082322 kernel: audit: type=1300 audit(1742249190.059:1437): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdfef8f700 a2=3 a3=0 items=0 ppid=1 pid=4775 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:06:30.059000 audit[4775]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdfef8f700 a2=3 a3=0 items=0 ppid=1 pid=4775 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:06:30.059000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Mar 17 22:06:30.097235 systemd-logind[1193]: New session 12 of user core. Mar 17 22:06:30.097875 systemd[1]: Started session-12.scope. Mar 17 22:06:30.106000 audit[4775]: USER_START pid=4775 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:06:30.109000 audit[4784]: CRED_ACQ pid=4784 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:06:30.787000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-10.244.26.146:22-101.227.231.190:59010 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:06:30.787606 systemd[1]: Started sshd@31-10.244.26.146:22-101.227.231.190:59010.service. Mar 17 22:06:30.838492 sshd[4775]: pam_unix(sshd:session): session closed for user core Mar 17 22:06:30.840000 audit[4775]: USER_END pid=4775 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:06:30.840000 audit[4775]: CRED_DISP pid=4775 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:06:30.843566 systemd[1]: sshd@30-10.244.26.146:22-139.178.89.65:42412.service: Deactivated successfully. Mar 17 22:06:30.843000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-10.244.26.146:22-139.178.89.65:42412 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:06:30.844804 systemd[1]: session-12.scope: Deactivated successfully. Mar 17 22:06:30.846156 systemd-logind[1193]: Session 12 logged out. Waiting for processes to exit. Mar 17 22:06:30.847753 systemd-logind[1193]: Removed session 12. Mar 17 22:06:30.898599 sshd[4753]: Failed password for root from 103.212.211.155 port 40962 ssh2 Mar 17 22:06:31.620510 sshd[4753]: Received disconnect from 103.212.211.155 port 40962:11: Bye Bye [preauth] Mar 17 22:06:31.620510 sshd[4753]: Disconnected from authenticating user root 103.212.211.155 port 40962 [preauth] Mar 17 22:06:31.622590 systemd[1]: sshd@29-10.244.26.146:22-103.212.211.155:40962.service: Deactivated successfully. Mar 17 22:06:31.627968 kernel: kauditd_printk_skb: 7 callbacks suppressed Mar 17 22:06:31.628156 kernel: audit: type=1131 audit(1742249191.622:1444): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-10.244.26.146:22-103.212.211.155:40962 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:06:31.622000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-10.244.26.146:22-103.212.211.155:40962 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:06:32.032680 sshd[4793]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.227.231.190 user=root Mar 17 22:06:32.033000 audit[4793]: USER_AUTH pid=4793 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=101.227.231.190 addr=101.227.231.190 terminal=ssh res=failed' Mar 17 22:06:32.040604 kernel: audit: type=1100 audit(1742249192.033:1445): pid=4793 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=101.227.231.190 addr=101.227.231.190 terminal=ssh res=failed' Mar 17 22:06:33.913216 sshd[4793]: Failed password for root from 101.227.231.190 port 59010 ssh2 Mar 17 22:06:35.986691 sshd[4793]: Received disconnect from 101.227.231.190 port 59010:11: Bye Bye [preauth] Mar 17 22:06:35.986691 sshd[4793]: Disconnected from authenticating user root 101.227.231.190 port 59010 [preauth] Mar 17 22:06:35.988258 systemd[1]: sshd@31-10.244.26.146:22-101.227.231.190:59010.service: Deactivated successfully. Mar 17 22:06:35.999815 kernel: audit: type=1131 audit(1742249195.988:1446): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-10.244.26.146:22-101.227.231.190:59010 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:06:35.988000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-10.244.26.146:22-101.227.231.190:59010 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:06:36.005180 systemd[1]: Started sshd@32-10.244.26.146:22-139.178.89.65:42906.service. Mar 17 22:06:36.005000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-10.244.26.146:22-139.178.89.65:42906 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:06:36.012621 kernel: audit: type=1130 audit(1742249196.005:1447): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-10.244.26.146:22-139.178.89.65:42906 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:06:36.939000 audit[4802]: USER_ACCT pid=4802 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:06:36.947709 kernel: audit: type=1101 audit(1742249196.939:1448): pid=4802 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:06:36.947806 sshd[4802]: Accepted publickey for core from 139.178.89.65 port 42906 ssh2: RSA SHA256:zyhiPLENj58svNToN4BOPPS+na2TgK0IE73Z79n4eiY Mar 17 22:06:36.950000 audit[4802]: CRED_ACQ pid=4802 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:06:36.952198 sshd[4802]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 22:06:36.957944 kernel: audit: type=1103 audit(1742249196.950:1449): pid=4802 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:06:36.962672 kernel: audit: type=1006 audit(1742249196.950:1450): pid=4802 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=13 res=1 Mar 17 22:06:36.963390 kernel: audit: type=1300 audit(1742249196.950:1450): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffddb596d00 a2=3 a3=0 items=0 ppid=1 pid=4802 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:06:36.950000 audit[4802]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffddb596d00 a2=3 a3=0 items=0 ppid=1 pid=4802 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:06:36.950000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Mar 17 22:06:36.975508 kernel: audit: type=1327 audit(1742249196.950:1450): proctitle=737368643A20636F7265205B707269765D Mar 17 22:06:36.975669 systemd[1]: Started session-13.scope. Mar 17 22:06:36.976195 systemd-logind[1193]: New session 13 of user core. Mar 17 22:06:37.001849 kernel: audit: type=1105 audit(1742249196.989:1451): pid=4802 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:06:36.989000 audit[4802]: USER_START pid=4802 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:06:36.992407 systemd[1]: Started sshd@33-10.244.26.146:22-143.110.184.217:53154.service. Mar 17 22:06:36.992000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@33-10.244.26.146:22-143.110.184.217:53154 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:06:37.016671 kernel: audit: type=1130 audit(1742249196.992:1452): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@33-10.244.26.146:22-143.110.184.217:53154 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:06:37.016794 kernel: audit: type=1103 audit(1742249197.002:1453): pid=4805 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:06:37.002000 audit[4805]: CRED_ACQ pid=4805 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:06:37.757353 sshd[4802]: pam_unix(sshd:session): session closed for user core Mar 17 22:06:37.759000 audit[4802]: USER_END pid=4802 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:06:37.772592 kernel: audit: type=1106 audit(1742249197.759:1454): pid=4802 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:06:37.772655 systemd[1]: sshd@32-10.244.26.146:22-139.178.89.65:42906.service: Deactivated successfully. Mar 17 22:06:37.774751 systemd[1]: session-13.scope: Deactivated successfully. Mar 17 22:06:37.759000 audit[4802]: CRED_DISP pid=4802 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:06:37.782016 systemd-logind[1193]: Session 13 logged out. Waiting for processes to exit. Mar 17 22:06:37.782570 kernel: audit: type=1104 audit(1742249197.759:1455): pid=4802 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:06:37.772000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-10.244.26.146:22-139.178.89.65:42906 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:06:37.783785 systemd-logind[1193]: Removed session 13. Mar 17 22:06:37.912420 systemd[1]: Started sshd@34-10.244.26.146:22-139.178.89.65:42922.service. Mar 17 22:06:37.912000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@34-10.244.26.146:22-139.178.89.65:42922 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:06:38.288049 sshd[4806]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.110.184.217 user=root Mar 17 22:06:38.287000 audit[4806]: USER_AUTH pid=4806 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=143.110.184.217 addr=143.110.184.217 terminal=ssh res=failed' Mar 17 22:06:38.873000 audit[4820]: USER_ACCT pid=4820 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:06:38.874270 sshd[4820]: Accepted publickey for core from 139.178.89.65 port 42922 ssh2: RSA SHA256:zyhiPLENj58svNToN4BOPPS+na2TgK0IE73Z79n4eiY Mar 17 22:06:38.875000 audit[4820]: CRED_ACQ pid=4820 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:06:38.875000 audit[4820]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc543d84a0 a2=3 a3=0 items=0 ppid=1 pid=4820 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:06:38.875000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Mar 17 22:06:38.877151 sshd[4820]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 22:06:38.886622 systemd[1]: Started session-14.scope. Mar 17 22:06:38.887123 systemd-logind[1193]: New session 14 of user core. Mar 17 22:06:38.895000 audit[4820]: USER_START pid=4820 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:06:38.899000 audit[4822]: CRED_ACQ pid=4822 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:06:39.677084 sshd[4820]: pam_unix(sshd:session): session closed for user core Mar 17 22:06:39.678000 audit[4820]: USER_END pid=4820 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:06:39.678000 audit[4820]: CRED_DISP pid=4820 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:06:39.680000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@34-10.244.26.146:22-139.178.89.65:42922 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:06:39.681077 systemd[1]: sshd@34-10.244.26.146:22-139.178.89.65:42922.service: Deactivated successfully. Mar 17 22:06:39.682354 systemd[1]: session-14.scope: Deactivated successfully. Mar 17 22:06:39.683744 systemd-logind[1193]: Session 14 logged out. Waiting for processes to exit. Mar 17 22:06:39.685256 systemd-logind[1193]: Removed session 14. Mar 17 22:06:39.829621 systemd[1]: Started sshd@35-10.244.26.146:22-139.178.89.65:42936.service. Mar 17 22:06:39.830000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@35-10.244.26.146:22-139.178.89.65:42936 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:06:40.660666 sshd[4806]: Failed password for root from 143.110.184.217 port 53154 ssh2 Mar 17 22:06:40.738000 audit[4830]: USER_ACCT pid=4830 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:06:40.741039 sshd[4830]: Accepted publickey for core from 139.178.89.65 port 42936 ssh2: RSA SHA256:zyhiPLENj58svNToN4BOPPS+na2TgK0IE73Z79n4eiY Mar 17 22:06:40.741000 audit[4830]: CRED_ACQ pid=4830 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:06:40.741000 audit[4830]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd204d3fc0 a2=3 a3=0 items=0 ppid=1 pid=4830 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:06:40.741000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Mar 17 22:06:40.742461 sshd[4830]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 22:06:40.752775 systemd[1]: Started session-15.scope. Mar 17 22:06:40.753273 systemd-logind[1193]: New session 15 of user core. Mar 17 22:06:40.764000 audit[4830]: USER_START pid=4830 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:06:40.767000 audit[4832]: CRED_ACQ pid=4832 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:06:41.493342 sshd[4830]: pam_unix(sshd:session): session closed for user core Mar 17 22:06:41.495000 audit[4830]: USER_END pid=4830 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:06:41.495000 audit[4830]: CRED_DISP pid=4830 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:06:41.497827 systemd[1]: sshd@35-10.244.26.146:22-139.178.89.65:42936.service: Deactivated successfully. Mar 17 22:06:41.497000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@35-10.244.26.146:22-139.178.89.65:42936 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:06:41.499118 systemd[1]: session-15.scope: Deactivated successfully. Mar 17 22:06:41.500209 systemd-logind[1193]: Session 15 logged out. Waiting for processes to exit. Mar 17 22:06:41.502417 systemd-logind[1193]: Removed session 15. Mar 17 22:06:42.205729 sshd[4806]: Connection closed by authenticating user root 143.110.184.217 port 53154 [preauth] Mar 17 22:06:42.212998 kernel: kauditd_printk_skb: 24 callbacks suppressed Mar 17 22:06:42.213156 kernel: audit: type=1131 audit(1742249202.207:1476): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@33-10.244.26.146:22-143.110.184.217:53154 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:06:42.207000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@33-10.244.26.146:22-143.110.184.217:53154 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:06:42.207204 systemd[1]: sshd@33-10.244.26.146:22-143.110.184.217:53154.service: Deactivated successfully. Mar 17 22:06:46.643000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@36-10.244.26.146:22-139.178.89.65:50606 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:06:46.643418 systemd[1]: Started sshd@36-10.244.26.146:22-139.178.89.65:50606.service. Mar 17 22:06:46.653625 kernel: audit: type=1130 audit(1742249206.643:1477): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@36-10.244.26.146:22-139.178.89.65:50606 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:06:47.443296 kernel: audit: type=1130 audit(1742249207.432:1478): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@37-10.244.26.146:22-143.110.184.217:49836 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:06:47.432000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@37-10.244.26.146:22-143.110.184.217:49836 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:06:47.432272 systemd[1]: Started sshd@37-10.244.26.146:22-143.110.184.217:49836.service. Mar 17 22:06:47.581000 audit[4871]: USER_ACCT pid=4871 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:06:47.589683 kernel: audit: type=1101 audit(1742249207.581:1479): pid=4871 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:06:47.589836 sshd[4871]: Accepted publickey for core from 139.178.89.65 port 50606 ssh2: RSA SHA256:zyhiPLENj58svNToN4BOPPS+na2TgK0IE73Z79n4eiY Mar 17 22:06:47.589000 audit[4871]: CRED_ACQ pid=4871 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:06:47.601398 kernel: audit: type=1103 audit(1742249207.589:1480): pid=4871 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:06:47.602086 kernel: audit: type=1006 audit(1742249207.589:1481): pid=4871 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Mar 17 22:06:47.602157 kernel: audit: type=1300 audit(1742249207.589:1481): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd7b188ba0 a2=3 a3=0 items=0 ppid=1 pid=4871 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:06:47.589000 audit[4871]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd7b188ba0 a2=3 a3=0 items=0 ppid=1 pid=4871 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:06:47.603461 sshd[4871]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 22:06:47.619814 kernel: audit: type=1327 audit(1742249207.589:1481): proctitle=737368643A20636F7265205B707269765D Mar 17 22:06:47.589000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Mar 17 22:06:47.630301 systemd-logind[1193]: New session 16 of user core. Mar 17 22:06:47.632084 systemd[1]: Started session-16.scope. Mar 17 22:06:47.644000 audit[4871]: USER_START pid=4871 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:06:47.654620 kernel: audit: type=1105 audit(1742249207.644:1482): pid=4871 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:06:47.645000 audit[4876]: CRED_ACQ pid=4876 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:06:47.663665 kernel: audit: type=1103 audit(1742249207.645:1483): pid=4876 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:06:48.374101 sshd[4871]: pam_unix(sshd:session): session closed for user core Mar 17 22:06:48.375000 audit[4871]: USER_END pid=4871 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:06:48.380000 audit[4871]: CRED_DISP pid=4871 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:06:48.388576 systemd-logind[1193]: Session 16 logged out. Waiting for processes to exit. Mar 17 22:06:48.391125 systemd[1]: sshd@36-10.244.26.146:22-139.178.89.65:50606.service: Deactivated successfully. Mar 17 22:06:48.393565 kernel: audit: type=1106 audit(1742249208.375:1484): pid=4871 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:06:48.393650 kernel: audit: type=1104 audit(1742249208.380:1485): pid=4871 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:06:48.390000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@36-10.244.26.146:22-139.178.89.65:50606 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:06:48.392524 systemd[1]: session-16.scope: Deactivated successfully. Mar 17 22:06:48.395103 systemd-logind[1193]: Removed session 16. Mar 17 22:06:48.560937 sshd[4874]: Invalid user esadmin from 143.110.184.217 port 49836 Mar 17 22:06:48.743433 sshd[4874]: pam_faillock(sshd:auth): User unknown Mar 17 22:06:48.744458 sshd[4874]: pam_unix(sshd:auth): check pass; user unknown Mar 17 22:06:48.744575 sshd[4874]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.110.184.217 Mar 17 22:06:48.745494 sshd[4874]: pam_faillock(sshd:auth): User unknown Mar 17 22:06:48.745000 audit[4874]: USER_AUTH pid=4874 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="esadmin" exe="/usr/sbin/sshd" hostname=143.110.184.217 addr=143.110.184.217 terminal=ssh res=failed' Mar 17 22:06:50.490112 sshd[4874]: Failed password for invalid user esadmin from 143.110.184.217 port 49836 ssh2 Mar 17 22:06:51.768350 sshd[4874]: Connection closed by invalid user esadmin 143.110.184.217 port 49836 [preauth] Mar 17 22:06:51.770314 systemd[1]: sshd@37-10.244.26.146:22-143.110.184.217:49836.service: Deactivated successfully. Mar 17 22:06:51.770000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@37-10.244.26.146:22-143.110.184.217:49836 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:06:53.449000 audit[1929]: AVC avc: denied { watch } for pid=1929 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526382 scontext=system_u:system_r:svirt_lxc_net_t:s0:c616,c864 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 22:06:53.455275 kernel: kauditd_printk_skb: 3 callbacks suppressed Mar 17 22:06:53.455491 kernel: audit: type=1400 audit(1742249213.449:1489): avc: denied { watch } for pid=1929 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526382 scontext=system_u:system_r:svirt_lxc_net_t:s0:c616,c864 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 22:06:53.449000 audit[1929]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000a442d0 a2=fc6 a3=0 items=0 ppid=1787 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c616,c864 key=(null) Mar 17 22:06:53.449000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Mar 17 22:06:53.477034 kernel: audit: type=1300 audit(1742249213.449:1489): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000a442d0 a2=fc6 a3=0 items=0 ppid=1787 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c616,c864 key=(null) Mar 17 22:06:53.477261 kernel: audit: type=1327 audit(1742249213.449:1489): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Mar 17 22:06:53.477341 kernel: audit: type=1400 audit(1742249213.459:1490): avc: denied { watch } for pid=1929 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526376 scontext=system_u:system_r:svirt_lxc_net_t:s0:c616,c864 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 22:06:53.459000 audit[1929]: AVC avc: denied { watch } for pid=1929 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526376 scontext=system_u:system_r:svirt_lxc_net_t:s0:c616,c864 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 22:06:53.484363 kernel: audit: type=1300 audit(1742249213.459:1490): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001712700 a2=fc6 a3=0 items=0 ppid=1787 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c616,c864 key=(null) Mar 17 22:06:53.459000 audit[1929]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001712700 a2=fc6 a3=0 items=0 ppid=1787 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c616,c864 key=(null) Mar 17 22:06:53.459000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Mar 17 22:06:53.512814 kernel: audit: type=1327 audit(1742249213.459:1490): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Mar 17 22:06:53.524000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@38-10.244.26.146:22-139.178.89.65:60732 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:06:53.524577 systemd[1]: Started sshd@38-10.244.26.146:22-139.178.89.65:60732.service. Mar 17 22:06:53.531900 kernel: audit: type=1130 audit(1742249213.524:1491): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@38-10.244.26.146:22-139.178.89.65:60732 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:06:54.430471 sshd[4886]: Accepted publickey for core from 139.178.89.65 port 60732 ssh2: RSA SHA256:zyhiPLENj58svNToN4BOPPS+na2TgK0IE73Z79n4eiY Mar 17 22:06:54.429000 audit[4886]: USER_ACCT pid=4886 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:06:54.441767 kernel: audit: type=1101 audit(1742249214.429:1492): pid=4886 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:06:54.446424 sshd[4886]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 22:06:54.442000 audit[4886]: CRED_ACQ pid=4886 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:06:54.454625 kernel: audit: type=1103 audit(1742249214.442:1493): pid=4886 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:06:54.443000 audit[4886]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff8119d640 a2=3 a3=0 items=0 ppid=1 pid=4886 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:06:54.459829 kernel: audit: type=1006 audit(1742249214.443:1494): pid=4886 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 Mar 17 22:06:54.443000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Mar 17 22:06:54.467438 systemd-logind[1193]: New session 17 of user core. Mar 17 22:06:54.468250 systemd[1]: Started session-17.scope. Mar 17 22:06:54.477000 audit[4886]: USER_START pid=4886 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:06:54.480000 audit[4888]: CRED_ACQ pid=4888 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:06:54.786000 audit[4022]: AVC avc: denied { watch } for pid=4022 comm="apiserver" path="/calico-apiserver-certs/..2025_03_17_22_05_30.2614453132/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c159,c447 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c159,c447 tclass=file permissive=0 Mar 17 22:06:54.786000 audit[4022]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0004fcfe0 a2=fc6 a3=0 items=0 ppid=3388 pid=4022 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c159,c447 key=(null) Mar 17 22:06:54.786000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Mar 17 22:06:55.216495 sshd[4886]: pam_unix(sshd:session): session closed for user core Mar 17 22:06:55.218000 audit[4886]: USER_END pid=4886 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:06:55.219000 audit[4886]: CRED_DISP pid=4886 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:06:55.222243 systemd[1]: sshd@38-10.244.26.146:22-139.178.89.65:60732.service: Deactivated successfully. Mar 17 22:06:55.222000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@38-10.244.26.146:22-139.178.89.65:60732 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:06:55.223809 systemd[1]: session-17.scope: Deactivated successfully. Mar 17 22:06:55.224795 systemd-logind[1193]: Session 17 logged out. Waiting for processes to exit. Mar 17 22:06:55.226381 systemd-logind[1193]: Removed session 17. Mar 17 22:06:55.784000 audit[1916]: AVC avc: denied { watch } for pid=1916 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=526378 scontext=system_u:system_r:svirt_lxc_net_t:s0:c529,c961 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 22:06:55.784000 audit[1916]: AVC avc: denied { watch } for pid=1916 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526382 scontext=system_u:system_r:svirt_lxc_net_t:s0:c529,c961 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 22:06:55.784000 audit[1916]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=77 a1=c010d637d0 a2=fc6 a3=0 items=0 ppid=1740 pid=1916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c529,c961 key=(null) Mar 17 22:06:55.784000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E32362E313436002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Mar 17 22:06:55.785000 audit[1916]: AVC avc: denied { watch } for pid=1916 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526376 scontext=system_u:system_r:svirt_lxc_net_t:s0:c529,c961 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 22:06:55.785000 audit[1916]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=77 a1=c010aa6a00 a2=fc6 a3=0 items=0 ppid=1740 pid=1916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c529,c961 key=(null) Mar 17 22:06:55.785000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E32362E313436002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Mar 17 22:06:55.784000 audit[1916]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=76 a1=c00f7e7b30 a2=fc6 a3=0 items=0 ppid=1740 pid=1916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c529,c961 key=(null) Mar 17 22:06:55.784000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E32362E313436002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Mar 17 22:06:55.787000 audit[1916]: AVC avc: denied { watch } for pid=1916 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526382 scontext=system_u:system_r:svirt_lxc_net_t:s0:c529,c961 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 22:06:55.787000 audit[1916]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=77 a1=c010d63890 a2=fc6 a3=0 items=0 ppid=1740 pid=1916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c529,c961 key=(null) Mar 17 22:06:55.787000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E32362E313436002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Mar 17 22:06:55.787000 audit[1916]: AVC avc: denied { watch } for pid=1916 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526376 scontext=system_u:system_r:svirt_lxc_net_t:s0:c529,c961 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 22:06:55.787000 audit[1916]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=77 a1=c010aa6a20 a2=fc6 a3=0 items=0 ppid=1740 pid=1916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c529,c961 key=(null) Mar 17 22:06:55.787000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E32362E313436002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Mar 17 22:06:55.788000 audit[1916]: AVC avc: denied { watch } for pid=1916 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=526384 scontext=system_u:system_r:svirt_lxc_net_t:s0:c529,c961 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 22:06:55.788000 audit[1916]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=77 a1=c010d63950 a2=fc6 a3=0 items=0 ppid=1740 pid=1916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c529,c961 key=(null) Mar 17 22:06:55.788000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3234342E32362E313436002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Mar 17 22:06:56.771000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@39-10.244.26.146:22-176.113.115.137:64001 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:06:56.772114 systemd[1]: Started sshd@39-10.244.26.146:22-176.113.115.137:64001.service. Mar 17 22:06:56.849510 sshd[4898]: kex_exchange_identification: Connection closed by remote host Mar 17 22:06:56.849510 sshd[4898]: Connection closed by 176.113.115.137 port 64001 Mar 17 22:06:56.850763 systemd[1]: sshd@39-10.244.26.146:22-176.113.115.137:64001.service: Deactivated successfully. Mar 17 22:06:56.850000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@39-10.244.26.146:22-176.113.115.137:64001 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:06:58.033402 systemd[1]: Started sshd@40-10.244.26.146:22-143.110.184.217:56422.service. Mar 17 22:06:58.033000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@40-10.244.26.146:22-143.110.184.217:56422 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:06:58.064788 systemd[1]: run-containerd-runc-k8s.io-b6b143babede96ab4cc2a0d50e25a04455503651f3bcbafebe0dec63df22d948-runc.YSXHJf.mount: Deactivated successfully. Mar 17 22:06:58.878444 sshd[4907]: Invalid user sol from 143.110.184.217 port 56422 Mar 17 22:06:59.050181 sshd[4907]: pam_faillock(sshd:auth): User unknown Mar 17 22:06:59.052038 sshd[4907]: pam_unix(sshd:auth): check pass; user unknown Mar 17 22:06:59.052111 sshd[4907]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.110.184.217 Mar 17 22:06:59.052907 sshd[4907]: pam_faillock(sshd:auth): User unknown Mar 17 22:06:59.058637 kernel: kauditd_printk_skb: 31 callbacks suppressed Mar 17 22:06:59.059064 kernel: audit: type=1100 audit(1742249219.052:1510): pid=4907 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="sol" exe="/usr/sbin/sshd" hostname=143.110.184.217 addr=143.110.184.217 terminal=ssh res=failed' Mar 17 22:06:59.052000 audit[4907]: USER_AUTH pid=4907 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="sol" exe="/usr/sbin/sshd" hostname=143.110.184.217 addr=143.110.184.217 terminal=ssh res=failed' Mar 17 22:06:59.567000 audit[4209]: AVC avc: denied { watch } for pid=4209 comm="apiserver" path="/calico-apiserver-certs/..2025_03_17_22_05_30.645549096/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c22,c568 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c22,c568 tclass=file permissive=0 Mar 17 22:06:59.578882 kernel: audit: type=1400 audit(1742249219.567:1511): avc: denied { watch } for pid=4209 comm="apiserver" path="/calico-apiserver-certs/..2025_03_17_22_05_30.645549096/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c22,c568 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c22,c568 tclass=file permissive=0 Mar 17 22:06:59.579087 kernel: audit: type=1300 audit(1742249219.567:1511): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000ba7c60 a2=fc6 a3=0 items=0 ppid=3694 pid=4209 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c22,c568 key=(null) Mar 17 22:06:59.567000 audit[4209]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000ba7c60 a2=fc6 a3=0 items=0 ppid=3694 pid=4209 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c22,c568 key=(null) Mar 17 22:06:59.587639 kernel: audit: type=1327 audit(1742249219.567:1511): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Mar 17 22:06:59.567000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Mar 17 22:07:00.368224 systemd[1]: Started sshd@41-10.244.26.146:22-139.178.89.65:60742.service. Mar 17 22:07:00.368000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@41-10.244.26.146:22-139.178.89.65:60742 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:07:00.375786 kernel: audit: type=1130 audit(1742249220.368:1512): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@41-10.244.26.146:22-139.178.89.65:60742 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:07:00.652000 audit[1929]: AVC avc: denied { watch } for pid=1929 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526376 scontext=system_u:system_r:svirt_lxc_net_t:s0:c616,c864 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 22:07:00.653000 audit[1929]: AVC avc: denied { watch } for pid=1929 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526376 scontext=system_u:system_r:svirt_lxc_net_t:s0:c616,c864 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 22:07:00.665760 kernel: audit: type=1400 audit(1742249220.652:1513): avc: denied { watch } for pid=1929 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526376 scontext=system_u:system_r:svirt_lxc_net_t:s0:c616,c864 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 22:07:00.665964 kernel: audit: type=1400 audit(1742249220.653:1514): avc: denied { watch } for pid=1929 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526376 scontext=system_u:system_r:svirt_lxc_net_t:s0:c616,c864 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 22:07:00.666059 kernel: audit: type=1300 audit(1742249220.653:1514): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001712c60 a2=fc6 a3=0 items=0 ppid=1787 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c616,c864 key=(null) Mar 17 22:07:00.653000 audit[1929]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001712c60 a2=fc6 a3=0 items=0 ppid=1787 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c616,c864 key=(null) Mar 17 22:07:00.653000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Mar 17 22:07:00.681386 kernel: audit: type=1327 audit(1742249220.653:1514): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Mar 17 22:07:00.653000 audit[1929]: AVC avc: denied { watch } for pid=1929 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526376 scontext=system_u:system_r:svirt_lxc_net_t:s0:c616,c864 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 22:07:00.653000 audit[1929]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001712ca0 a2=fc6 a3=0 items=0 ppid=1787 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c616,c864 key=(null) Mar 17 22:07:00.653000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Mar 17 22:07:00.652000 audit[1929]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00110c7e0 a2=fc6 a3=0 items=0 ppid=1787 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c616,c864 key=(null) Mar 17 22:07:00.652000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Mar 17 22:07:00.692640 kernel: audit: type=1400 audit(1742249220.653:1515): avc: denied { watch } for pid=1929 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526376 scontext=system_u:system_r:svirt_lxc_net_t:s0:c616,c864 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 22:07:00.659000 audit[1929]: AVC avc: denied { watch } for pid=1929 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526376 scontext=system_u:system_r:svirt_lxc_net_t:s0:c616,c864 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Mar 17 22:07:00.659000 audit[1929]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001712fa0 a2=fc6 a3=0 items=0 ppid=1787 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c616,c864 key=(null) Mar 17 22:07:00.659000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Mar 17 22:07:00.973473 sshd[4907]: Failed password for invalid user sol from 143.110.184.217 port 56422 ssh2 Mar 17 22:07:01.285054 sshd[4924]: Accepted publickey for core from 139.178.89.65 port 60742 ssh2: RSA SHA256:zyhiPLENj58svNToN4BOPPS+na2TgK0IE73Z79n4eiY Mar 17 22:07:01.284000 audit[4924]: USER_ACCT pid=4924 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:07:01.286000 audit[4924]: CRED_ACQ pid=4924 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:07:01.286000 audit[4924]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd815e1a70 a2=3 a3=0 items=0 ppid=1 pid=4924 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:07:01.286000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Mar 17 22:07:01.289167 sshd[4924]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 22:07:01.304297 systemd[1]: Started session-18.scope. Mar 17 22:07:01.305655 systemd-logind[1193]: New session 18 of user core. Mar 17 22:07:01.316000 audit[4924]: USER_START pid=4924 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:07:01.319000 audit[4928]: CRED_ACQ pid=4928 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:07:02.092631 sshd[4924]: pam_unix(sshd:session): session closed for user core Mar 17 22:07:02.094000 audit[4924]: USER_END pid=4924 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:07:02.095000 audit[4924]: CRED_DISP pid=4924 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:07:02.098697 systemd-logind[1193]: Session 18 logged out. Waiting for processes to exit. Mar 17 22:07:02.100000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@41-10.244.26.146:22-139.178.89.65:60742 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:07:02.100394 systemd[1]: sshd@41-10.244.26.146:22-139.178.89.65:60742.service: Deactivated successfully. Mar 17 22:07:02.101576 systemd[1]: session-18.scope: Deactivated successfully. Mar 17 22:07:02.103865 systemd-logind[1193]: Removed session 18. Mar 17 22:07:02.930313 sshd[4907]: Connection closed by invalid user sol 143.110.184.217 port 56422 [preauth] Mar 17 22:07:02.931705 systemd[1]: sshd@40-10.244.26.146:22-143.110.184.217:56422.service: Deactivated successfully. Mar 17 22:07:02.931000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@40-10.244.26.146:22-143.110.184.217:56422 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:07:07.249743 systemd[1]: Started sshd@42-10.244.26.146:22-139.178.89.65:35392.service. Mar 17 22:07:07.249000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@42-10.244.26.146:22-139.178.89.65:35392 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:07:07.255727 kernel: kauditd_printk_skb: 18 callbacks suppressed Mar 17 22:07:07.255892 kernel: audit: type=1130 audit(1742249227.249:1526): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@42-10.244.26.146:22-139.178.89.65:35392 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:07:08.151000 audit[4940]: USER_ACCT pid=4940 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:07:08.153894 sshd[4940]: Accepted publickey for core from 139.178.89.65 port 35392 ssh2: RSA SHA256:zyhiPLENj58svNToN4BOPPS+na2TgK0IE73Z79n4eiY Mar 17 22:07:08.159713 kernel: audit: type=1101 audit(1742249228.151:1527): pid=4940 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:07:08.160469 sshd[4940]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 22:07:08.159000 audit[4940]: CRED_ACQ pid=4940 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:07:08.170653 kernel: audit: type=1103 audit(1742249228.159:1528): pid=4940 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:07:08.180633 kernel: audit: type=1006 audit(1742249228.159:1529): pid=4940 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=19 res=1 Mar 17 22:07:08.159000 audit[4940]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe46f64190 a2=3 a3=0 items=0 ppid=1 pid=4940 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:07:08.188148 systemd[1]: Started session-19.scope. Mar 17 22:07:08.192504 systemd-logind[1193]: New session 19 of user core. Mar 17 22:07:08.194139 kernel: audit: type=1300 audit(1742249228.159:1529): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe46f64190 a2=3 a3=0 items=0 ppid=1 pid=4940 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:07:08.194232 kernel: audit: type=1327 audit(1742249228.159:1529): proctitle=737368643A20636F7265205B707269765D Mar 17 22:07:08.159000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Mar 17 22:07:08.207000 audit[4940]: USER_START pid=4940 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:07:08.216592 kernel: audit: type=1105 audit(1742249228.207:1530): pid=4940 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:07:08.216771 kernel: audit: type=1103 audit(1742249228.211:1531): pid=4942 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:07:08.211000 audit[4942]: CRED_ACQ pid=4942 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:07:08.694869 systemd[1]: Started sshd@43-10.244.26.146:22-143.110.184.217:50872.service. Mar 17 22:07:08.695000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@43-10.244.26.146:22-143.110.184.217:50872 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:07:08.702577 kernel: audit: type=1130 audit(1742249228.695:1532): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@43-10.244.26.146:22-143.110.184.217:50872 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:07:08.916691 sshd[4940]: pam_unix(sshd:session): session closed for user core Mar 17 22:07:08.918000 audit[4940]: USER_END pid=4940 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:07:08.921438 systemd-logind[1193]: Session 19 logged out. Waiting for processes to exit. Mar 17 22:07:08.923958 systemd[1]: sshd@42-10.244.26.146:22-139.178.89.65:35392.service: Deactivated successfully. Mar 17 22:07:08.925110 systemd[1]: session-19.scope: Deactivated successfully. Mar 17 22:07:08.927588 kernel: audit: type=1106 audit(1742249228.918:1533): pid=4940 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:07:08.918000 audit[4940]: CRED_DISP pid=4940 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:07:08.923000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@42-10.244.26.146:22-139.178.89.65:35392 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:07:08.928819 systemd-logind[1193]: Removed session 19. Mar 17 22:07:09.064691 systemd[1]: Started sshd@44-10.244.26.146:22-139.178.89.65:35402.service. Mar 17 22:07:09.064000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@44-10.244.26.146:22-139.178.89.65:35402 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:07:09.742569 sshd[4950]: Invalid user nagios from 143.110.184.217 port 50872 Mar 17 22:07:09.919943 sshd[4950]: pam_faillock(sshd:auth): User unknown Mar 17 22:07:09.921498 sshd[4950]: pam_unix(sshd:auth): check pass; user unknown Mar 17 22:07:09.921730 sshd[4950]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.110.184.217 Mar 17 22:07:09.922673 sshd[4950]: pam_faillock(sshd:auth): User unknown Mar 17 22:07:09.922000 audit[4950]: USER_AUTH pid=4950 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="nagios" exe="/usr/sbin/sshd" hostname=143.110.184.217 addr=143.110.184.217 terminal=ssh res=failed' Mar 17 22:07:09.988000 audit[4954]: USER_ACCT pid=4954 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:07:09.990864 sshd[4954]: Accepted publickey for core from 139.178.89.65 port 35402 ssh2: RSA SHA256:zyhiPLENj58svNToN4BOPPS+na2TgK0IE73Z79n4eiY Mar 17 22:07:09.992000 audit[4954]: CRED_ACQ pid=4954 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:07:09.992000 audit[4954]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe17dceb80 a2=3 a3=0 items=0 ppid=1 pid=4954 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:07:09.992000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Mar 17 22:07:09.993530 sshd[4954]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 22:07:10.005038 systemd-logind[1193]: New session 20 of user core. Mar 17 22:07:10.009437 systemd[1]: Started session-20.scope. Mar 17 22:07:10.040000 audit[4954]: USER_START pid=4954 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:07:10.045000 audit[4962]: CRED_ACQ pid=4962 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:07:11.228207 sshd[4954]: pam_unix(sshd:session): session closed for user core Mar 17 22:07:11.235000 audit[4954]: USER_END pid=4954 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:07:11.236000 audit[4954]: CRED_DISP pid=4954 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:07:11.239217 systemd[1]: sshd@44-10.244.26.146:22-139.178.89.65:35402.service: Deactivated successfully. Mar 17 22:07:11.240496 systemd[1]: session-20.scope: Deactivated successfully. Mar 17 22:07:11.239000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@44-10.244.26.146:22-139.178.89.65:35402 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:07:11.241462 systemd-logind[1193]: Session 20 logged out. Waiting for processes to exit. Mar 17 22:07:11.243341 systemd-logind[1193]: Removed session 20. Mar 17 22:07:11.373000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@45-10.244.26.146:22-139.178.89.65:48706 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:07:11.373937 systemd[1]: Started sshd@45-10.244.26.146:22-139.178.89.65:48706.service. Mar 17 22:07:12.279825 sshd[4970]: Accepted publickey for core from 139.178.89.65 port 48706 ssh2: RSA SHA256:zyhiPLENj58svNToN4BOPPS+na2TgK0IE73Z79n4eiY Mar 17 22:07:12.292195 kernel: kauditd_printk_skb: 15 callbacks suppressed Mar 17 22:07:12.292353 kernel: audit: type=1101 audit(1742249232.279:1547): pid=4970 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:07:12.279000 audit[4970]: USER_ACCT pid=4970 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:07:12.300462 kernel: audit: type=1103 audit(1742249232.292:1548): pid=4970 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:07:12.300621 kernel: audit: type=1006 audit(1742249232.292:1549): pid=4970 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=21 res=1 Mar 17 22:07:12.292000 audit[4970]: CRED_ACQ pid=4970 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:07:12.296871 sshd[4970]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 22:07:12.307356 kernel: audit: type=1300 audit(1742249232.292:1549): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdc2dfff10 a2=3 a3=0 items=0 ppid=1 pid=4970 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:07:12.292000 audit[4970]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdc2dfff10 a2=3 a3=0 items=0 ppid=1 pid=4970 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:07:12.314322 kernel: audit: type=1327 audit(1742249232.292:1549): proctitle=737368643A20636F7265205B707269765D Mar 17 22:07:12.292000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Mar 17 22:07:12.328425 systemd[1]: Started session-21.scope. Mar 17 22:07:12.329368 systemd-logind[1193]: New session 21 of user core. Mar 17 22:07:12.339000 audit[4970]: USER_START pid=4970 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:07:12.348652 kernel: audit: type=1105 audit(1742249232.339:1550): pid=4970 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:07:12.359175 kernel: audit: type=1103 audit(1742249232.349:1551): pid=4972 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:07:12.349000 audit[4972]: CRED_ACQ pid=4972 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:07:12.550860 sshd[4950]: Failed password for invalid user nagios from 143.110.184.217 port 50872 ssh2 Mar 17 22:07:13.494674 sshd[4950]: Connection closed by invalid user nagios 143.110.184.217 port 50872 [preauth] Mar 17 22:07:13.496000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@43-10.244.26.146:22-143.110.184.217:50872 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:07:13.496457 systemd[1]: sshd@43-10.244.26.146:22-143.110.184.217:50872.service: Deactivated successfully. Mar 17 22:07:13.503642 kernel: audit: type=1131 audit(1742249233.496:1552): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@43-10.244.26.146:22-143.110.184.217:50872 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:07:14.350745 sshd[4970]: pam_unix(sshd:session): session closed for user core Mar 17 22:07:14.352000 audit[4970]: USER_END pid=4970 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:07:14.360718 systemd[1]: sshd@45-10.244.26.146:22-139.178.89.65:48706.service: Deactivated successfully. Mar 17 22:07:14.362360 systemd[1]: session-21.scope: Deactivated successfully. Mar 17 22:07:14.369724 kernel: audit: type=1106 audit(1742249234.352:1553): pid=4970 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:07:14.366500 systemd-logind[1193]: Session 21 logged out. Waiting for processes to exit. Mar 17 22:07:14.368404 systemd-logind[1193]: Removed session 21. Mar 17 22:07:14.356000 audit[4970]: CRED_DISP pid=4970 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:07:14.379640 kernel: audit: type=1104 audit(1742249234.356:1554): pid=4970 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:07:14.360000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@45-10.244.26.146:22-139.178.89.65:48706 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:07:14.411000 audit[5002]: NETFILTER_CFG table=filter:122 family=2 entries=20 op=nft_register_rule pid=5002 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 22:07:14.411000 audit[5002]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffddab24f70 a2=0 a3=7ffddab24f5c items=0 ppid=2206 pid=5002 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:07:14.411000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 22:07:14.418000 audit[5002]: NETFILTER_CFG table=nat:123 family=2 entries=22 op=nft_register_rule pid=5002 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 22:07:14.418000 audit[5002]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffddab24f70 a2=0 a3=0 items=0 ppid=2206 pid=5002 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:07:14.418000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 22:07:14.439000 audit[5005]: NETFILTER_CFG table=filter:124 family=2 entries=32 op=nft_register_rule pid=5005 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 22:07:14.439000 audit[5005]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffc72a5c9d0 a2=0 a3=7ffc72a5c9bc items=0 ppid=2206 pid=5005 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:07:14.439000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 22:07:14.445000 audit[5005]: NETFILTER_CFG table=nat:125 family=2 entries=22 op=nft_register_rule pid=5005 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 22:07:14.445000 audit[5005]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffc72a5c9d0 a2=0 a3=0 items=0 ppid=2206 pid=5005 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:07:14.445000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 22:07:14.498067 systemd[1]: Started sshd@46-10.244.26.146:22-139.178.89.65:48722.service. Mar 17 22:07:14.498000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@46-10.244.26.146:22-139.178.89.65:48722 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:07:15.406000 audit[5007]: USER_ACCT pid=5007 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:07:15.407148 sshd[5007]: Accepted publickey for core from 139.178.89.65 port 48722 ssh2: RSA SHA256:zyhiPLENj58svNToN4BOPPS+na2TgK0IE73Z79n4eiY Mar 17 22:07:15.408000 audit[5007]: CRED_ACQ pid=5007 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:07:15.408000 audit[5007]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe5a9bc9b0 a2=3 a3=0 items=0 ppid=1 pid=5007 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:07:15.408000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Mar 17 22:07:15.410563 sshd[5007]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 22:07:15.419398 systemd[1]: Started session-22.scope. Mar 17 22:07:15.420259 systemd-logind[1193]: New session 22 of user core. Mar 17 22:07:15.431000 audit[5007]: USER_START pid=5007 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:07:15.438000 audit[5010]: CRED_ACQ pid=5010 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:07:15.898422 systemd[1]: run-containerd-runc-k8s.io-08c5c45eae9aba2a56359dea30e909a27076c5c8abf4308aaf72f714e90fc123-runc.mQMnSU.mount: Deactivated successfully. Mar 17 22:07:16.584809 sshd[5007]: pam_unix(sshd:session): session closed for user core Mar 17 22:07:16.586000 audit[5007]: USER_END pid=5007 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:07:16.587000 audit[5007]: CRED_DISP pid=5007 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:07:16.589628 systemd[1]: sshd@46-10.244.26.146:22-139.178.89.65:48722.service: Deactivated successfully. Mar 17 22:07:16.589000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@46-10.244.26.146:22-139.178.89.65:48722 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:07:16.590886 systemd[1]: session-22.scope: Deactivated successfully. Mar 17 22:07:16.594311 systemd-logind[1193]: Session 22 logged out. Waiting for processes to exit. Mar 17 22:07:16.596175 systemd-logind[1193]: Removed session 22. Mar 17 22:07:16.735429 systemd[1]: Started sshd@47-10.244.26.146:22-139.178.89.65:48734.service. Mar 17 22:07:16.735000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@47-10.244.26.146:22-139.178.89.65:48734 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:07:17.641742 sshd[5037]: Accepted publickey for core from 139.178.89.65 port 48734 ssh2: RSA SHA256:zyhiPLENj58svNToN4BOPPS+na2TgK0IE73Z79n4eiY Mar 17 22:07:17.655102 kernel: kauditd_printk_skb: 25 callbacks suppressed Mar 17 22:07:17.655311 kernel: audit: type=1101 audit(1742249237.641:1570): pid=5037 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:07:17.641000 audit[5037]: USER_ACCT pid=5037 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:07:17.647000 audit[5037]: CRED_ACQ pid=5037 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:07:17.656252 sshd[5037]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 22:07:17.662573 kernel: audit: type=1103 audit(1742249237.647:1571): pid=5037 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:07:17.663145 kernel: audit: type=1006 audit(1742249237.647:1572): pid=5037 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 Mar 17 22:07:17.647000 audit[5037]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe44300b00 a2=3 a3=0 items=0 ppid=1 pid=5037 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:07:17.675791 kernel: audit: type=1300 audit(1742249237.647:1572): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe44300b00 a2=3 a3=0 items=0 ppid=1 pid=5037 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:07:17.647000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Mar 17 22:07:17.680290 kernel: audit: type=1327 audit(1742249237.647:1572): proctitle=737368643A20636F7265205B707269765D Mar 17 22:07:17.683162 systemd[1]: Started session-23.scope. Mar 17 22:07:17.684338 systemd-logind[1193]: New session 23 of user core. Mar 17 22:07:17.693000 audit[5037]: USER_START pid=5037 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:07:17.693000 audit[5041]: CRED_ACQ pid=5041 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:07:17.707576 kernel: audit: type=1105 audit(1742249237.693:1573): pid=5037 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:07:17.707687 kernel: audit: type=1103 audit(1742249237.693:1574): pid=5041 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:07:18.395111 sshd[5037]: pam_unix(sshd:session): session closed for user core Mar 17 22:07:18.396000 audit[5037]: USER_END pid=5037 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:07:18.400175 systemd[1]: sshd@47-10.244.26.146:22-139.178.89.65:48734.service: Deactivated successfully. Mar 17 22:07:18.401518 systemd[1]: session-23.scope: Deactivated successfully. Mar 17 22:07:18.418617 kernel: audit: type=1106 audit(1742249238.396:1575): pid=5037 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:07:18.397000 audit[5037]: CRED_DISP pid=5037 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:07:18.425568 kernel: audit: type=1104 audit(1742249238.397:1576): pid=5037 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:07:18.425529 systemd-logind[1193]: Session 23 logged out. Waiting for processes to exit. Mar 17 22:07:18.400000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@47-10.244.26.146:22-139.178.89.65:48734 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:07:18.432860 systemd-logind[1193]: Removed session 23. Mar 17 22:07:18.434249 kernel: audit: type=1131 audit(1742249238.400:1577): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@47-10.244.26.146:22-139.178.89.65:48734 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:07:19.242749 systemd[1]: Started sshd@48-10.244.26.146:22-143.110.184.217:33532.service. Mar 17 22:07:19.242000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@48-10.244.26.146:22-143.110.184.217:33532 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:07:20.304452 sshd[5050]: Invalid user node from 143.110.184.217 port 33532 Mar 17 22:07:20.528857 sshd[5050]: pam_faillock(sshd:auth): User unknown Mar 17 22:07:20.529901 sshd[5050]: pam_unix(sshd:auth): check pass; user unknown Mar 17 22:07:20.530007 sshd[5050]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.110.184.217 Mar 17 22:07:20.530988 sshd[5050]: pam_faillock(sshd:auth): User unknown Mar 17 22:07:20.530000 audit[5050]: USER_AUTH pid=5050 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="node" exe="/usr/sbin/sshd" hostname=143.110.184.217 addr=143.110.184.217 terminal=ssh res=failed' Mar 17 22:07:20.991000 audit[5053]: NETFILTER_CFG table=filter:126 family=2 entries=20 op=nft_register_rule pid=5053 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 22:07:20.991000 audit[5053]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffd7e654160 a2=0 a3=7ffd7e65414c items=0 ppid=2206 pid=5053 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:07:20.991000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 22:07:21.001000 audit[5053]: NETFILTER_CFG table=nat:127 family=2 entries=106 op=nft_register_chain pid=5053 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 22:07:21.001000 audit[5053]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffd7e654160 a2=0 a3=7ffd7e65414c items=0 ppid=2206 pid=5053 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:07:21.001000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 22:07:22.667232 sshd[5050]: Failed password for invalid user node from 143.110.184.217 port 33532 ssh2 Mar 17 22:07:23.542236 systemd[1]: Started sshd@49-10.244.26.146:22-139.178.89.65:39330.service. Mar 17 22:07:23.553386 kernel: kauditd_printk_skb: 8 callbacks suppressed Mar 17 22:07:23.553628 kernel: audit: type=1130 audit(1742249243.542:1582): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@49-10.244.26.146:22-139.178.89.65:39330 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:07:23.542000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@49-10.244.26.146:22-139.178.89.65:39330 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:07:24.465232 sshd[5060]: Accepted publickey for core from 139.178.89.65 port 39330 ssh2: RSA SHA256:zyhiPLENj58svNToN4BOPPS+na2TgK0IE73Z79n4eiY Mar 17 22:07:24.464000 audit[5060]: USER_ACCT pid=5060 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:07:24.475991 kernel: audit: type=1101 audit(1742249244.464:1583): pid=5060 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:07:24.475000 audit[5060]: CRED_ACQ pid=5060 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:07:24.483580 kernel: audit: type=1103 audit(1742249244.475:1584): pid=5060 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:07:24.484253 kernel: audit: type=1006 audit(1742249244.475:1585): pid=5060 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 Mar 17 22:07:24.475000 audit[5060]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe41faffd0 a2=3 a3=0 items=0 ppid=1 pid=5060 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:07:24.488907 sshd[5060]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 22:07:24.495404 kernel: audit: type=1300 audit(1742249244.475:1585): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe41faffd0 a2=3 a3=0 items=0 ppid=1 pid=5060 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:07:24.475000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Mar 17 22:07:24.501691 kernel: audit: type=1327 audit(1742249244.475:1585): proctitle=737368643A20636F7265205B707269765D Mar 17 22:07:24.509119 systemd-logind[1193]: New session 24 of user core. Mar 17 22:07:24.510523 systemd[1]: Started session-24.scope. Mar 17 22:07:24.519000 audit[5060]: USER_START pid=5060 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:07:24.528572 kernel: audit: type=1105 audit(1742249244.519:1586): pid=5060 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:07:24.528000 audit[5062]: CRED_ACQ pid=5062 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:07:24.536574 kernel: audit: type=1103 audit(1742249244.528:1587): pid=5062 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:07:24.633559 sshd[5050]: Connection closed by invalid user node 143.110.184.217 port 33532 [preauth] Mar 17 22:07:24.635220 systemd[1]: sshd@48-10.244.26.146:22-143.110.184.217:33532.service: Deactivated successfully. Mar 17 22:07:24.635000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@48-10.244.26.146:22-143.110.184.217:33532 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:07:24.643626 kernel: audit: type=1131 audit(1742249244.635:1588): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@48-10.244.26.146:22-143.110.184.217:33532 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:07:25.391804 sshd[5060]: pam_unix(sshd:session): session closed for user core Mar 17 22:07:25.393000 audit[5060]: USER_END pid=5060 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:07:25.405616 kernel: audit: type=1106 audit(1742249245.393:1589): pid=5060 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:07:25.406448 systemd[1]: sshd@49-10.244.26.146:22-139.178.89.65:39330.service: Deactivated successfully. Mar 17 22:07:25.407817 systemd[1]: session-24.scope: Deactivated successfully. Mar 17 22:07:25.411918 systemd-logind[1193]: Session 24 logged out. Waiting for processes to exit. Mar 17 22:07:25.393000 audit[5060]: CRED_DISP pid=5060 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:07:25.406000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@49-10.244.26.146:22-139.178.89.65:39330 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:07:25.414184 systemd-logind[1193]: Removed session 24. Mar 17 22:07:28.057163 systemd[1]: run-containerd-runc-k8s.io-b6b143babede96ab4cc2a0d50e25a04455503651f3bcbafebe0dec63df22d948-runc.uJVqwV.mount: Deactivated successfully. Mar 17 22:07:29.841326 systemd[1]: Started sshd@50-10.244.26.146:22-143.110.184.217:41926.service. Mar 17 22:07:29.848850 kernel: kauditd_printk_skb: 2 callbacks suppressed Mar 17 22:07:29.849718 kernel: audit: type=1130 audit(1742249249.841:1592): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@50-10.244.26.146:22-143.110.184.217:41926 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:07:29.841000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@50-10.244.26.146:22-143.110.184.217:41926 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:07:30.553673 systemd[1]: Started sshd@51-10.244.26.146:22-139.178.89.65:39332.service. Mar 17 22:07:30.554000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@51-10.244.26.146:22-139.178.89.65:39332 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:07:30.561580 kernel: audit: type=1130 audit(1742249250.554:1593): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@51-10.244.26.146:22-139.178.89.65:39332 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:07:30.726771 sshd[5104]: Invalid user solana from 143.110.184.217 port 41926 Mar 17 22:07:30.897886 sshd[5104]: pam_faillock(sshd:auth): User unknown Mar 17 22:07:30.899242 sshd[5104]: pam_unix(sshd:auth): check pass; user unknown Mar 17 22:07:30.899323 sshd[5104]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.110.184.217 Mar 17 22:07:30.900293 sshd[5104]: pam_faillock(sshd:auth): User unknown Mar 17 22:07:30.899000 audit[5104]: USER_AUTH pid=5104 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="solana" exe="/usr/sbin/sshd" hostname=143.110.184.217 addr=143.110.184.217 terminal=ssh res=failed' Mar 17 22:07:30.907656 kernel: audit: type=1100 audit(1742249250.899:1594): pid=5104 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="solana" exe="/usr/sbin/sshd" hostname=143.110.184.217 addr=143.110.184.217 terminal=ssh res=failed' Mar 17 22:07:31.457000 audit[5107]: USER_ACCT pid=5107 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:07:31.462969 sshd[5107]: Accepted publickey for core from 139.178.89.65 port 39332 ssh2: RSA SHA256:zyhiPLENj58svNToN4BOPPS+na2TgK0IE73Z79n4eiY Mar 17 22:07:31.470046 kernel: audit: type=1101 audit(1742249251.457:1595): pid=5107 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:07:31.470000 audit[5107]: CRED_ACQ pid=5107 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:07:31.472497 sshd[5107]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 22:07:31.477617 kernel: audit: type=1103 audit(1742249251.470:1596): pid=5107 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:07:31.483597 kernel: audit: type=1006 audit(1742249251.471:1597): pid=5107 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 Mar 17 22:07:31.471000 audit[5107]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe05aff1f0 a2=3 a3=0 items=0 ppid=1 pid=5107 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:07:31.471000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Mar 17 22:07:31.494913 kernel: audit: type=1300 audit(1742249251.471:1597): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe05aff1f0 a2=3 a3=0 items=0 ppid=1 pid=5107 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:07:31.495051 kernel: audit: type=1327 audit(1742249251.471:1597): proctitle=737368643A20636F7265205B707269765D Mar 17 22:07:31.501430 systemd[1]: Started session-25.scope. Mar 17 22:07:31.502454 systemd-logind[1193]: New session 25 of user core. Mar 17 22:07:31.516000 audit[5107]: USER_START pid=5107 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:07:31.524602 kernel: audit: type=1105 audit(1742249251.516:1598): pid=5107 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:07:31.524000 audit[5109]: CRED_ACQ pid=5109 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:07:31.534575 kernel: audit: type=1103 audit(1742249251.524:1599): pid=5109 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:07:32.270893 sshd[5107]: pam_unix(sshd:session): session closed for user core Mar 17 22:07:32.272000 audit[5107]: USER_END pid=5107 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:07:32.272000 audit[5107]: CRED_DISP pid=5107 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:07:32.275711 systemd-logind[1193]: Session 25 logged out. Waiting for processes to exit. Mar 17 22:07:32.276930 systemd[1]: sshd@51-10.244.26.146:22-139.178.89.65:39332.service: Deactivated successfully. Mar 17 22:07:32.276000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@51-10.244.26.146:22-139.178.89.65:39332 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:07:32.278138 systemd[1]: session-25.scope: Deactivated successfully. Mar 17 22:07:32.280058 systemd-logind[1193]: Removed session 25. Mar 17 22:07:33.077040 sshd[5104]: Failed password for invalid user solana from 143.110.184.217 port 41926 ssh2 Mar 17 22:07:34.973871 sshd[5104]: Connection closed by invalid user solana 143.110.184.217 port 41926 [preauth] Mar 17 22:07:34.976397 systemd[1]: sshd@50-10.244.26.146:22-143.110.184.217:41926.service: Deactivated successfully. Mar 17 22:07:34.982648 kernel: kauditd_printk_skb: 3 callbacks suppressed Mar 17 22:07:34.982891 kernel: audit: type=1131 audit(1742249254.976:1603): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@50-10.244.26.146:22-143.110.184.217:41926 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:07:34.976000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@50-10.244.26.146:22-143.110.184.217:41926 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:07:37.423803 systemd[1]: Started sshd@52-10.244.26.146:22-139.178.89.65:48630.service. Mar 17 22:07:37.424000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@52-10.244.26.146:22-139.178.89.65:48630 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:07:37.431609 kernel: audit: type=1130 audit(1742249257.424:1604): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@52-10.244.26.146:22-139.178.89.65:48630 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:07:38.326000 audit[5122]: USER_ACCT pid=5122 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:07:38.331114 sshd[5122]: Accepted publickey for core from 139.178.89.65 port 48630 ssh2: RSA SHA256:zyhiPLENj58svNToN4BOPPS+na2TgK0IE73Z79n4eiY Mar 17 22:07:38.337581 kernel: audit: type=1101 audit(1742249258.326:1605): pid=5122 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:07:38.337000 audit[5122]: CRED_ACQ pid=5122 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:07:38.340066 sshd[5122]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 22:07:38.345656 kernel: audit: type=1103 audit(1742249258.337:1606): pid=5122 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:07:38.350660 kernel: audit: type=1006 audit(1742249258.337:1607): pid=5122 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 Mar 17 22:07:38.337000 audit[5122]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff9287ce90 a2=3 a3=0 items=0 ppid=1 pid=5122 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:07:38.356389 systemd[1]: Started session-26.scope. Mar 17 22:07:38.337000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Mar 17 22:07:38.358836 systemd-logind[1193]: New session 26 of user core. Mar 17 22:07:38.361031 kernel: audit: type=1300 audit(1742249258.337:1607): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff9287ce90 a2=3 a3=0 items=0 ppid=1 pid=5122 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 22:07:38.361179 kernel: audit: type=1327 audit(1742249258.337:1607): proctitle=737368643A20636F7265205B707269765D Mar 17 22:07:38.367000 audit[5122]: USER_START pid=5122 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:07:38.375774 kernel: audit: type=1105 audit(1742249258.367:1608): pid=5122 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:07:38.376000 audit[5124]: CRED_ACQ pid=5124 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:07:38.383592 kernel: audit: type=1103 audit(1742249258.376:1609): pid=5124 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:07:39.089504 sshd[5122]: pam_unix(sshd:session): session closed for user core Mar 17 22:07:39.091000 audit[5122]: USER_END pid=5122 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:07:39.091000 audit[5122]: CRED_DISP pid=5122 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:07:39.101630 kernel: audit: type=1106 audit(1742249259.091:1610): pid=5122 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' Mar 17 22:07:39.101836 systemd[1]: sshd@52-10.244.26.146:22-139.178.89.65:48630.service: Deactivated successfully. Mar 17 22:07:39.100000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@52-10.244.26.146:22-139.178.89.65:48630 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:07:39.103204 systemd[1]: session-26.scope: Deactivated successfully. Mar 17 22:07:39.104318 systemd-logind[1193]: Session 26 logged out. Waiting for processes to exit. Mar 17 22:07:39.105633 systemd-logind[1193]: Removed session 26. Mar 17 22:07:40.390391 systemd[1]: Started sshd@53-10.244.26.146:22-143.110.184.217:50366.service. Mar 17 22:07:40.406335 kernel: kauditd_printk_skb: 2 callbacks suppressed Mar 17 22:07:40.406528 kernel: audit: type=1130 audit(1742249260.390:1613): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@53-10.244.26.146:22-143.110.184.217:50366 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:07:40.390000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@53-10.244.26.146:22-143.110.184.217:50366 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:07:41.186213 sshd[5133]: Invalid user lighthouse from 143.110.184.217 port 50366 Mar 17 22:07:41.383983 sshd[5133]: pam_faillock(sshd:auth): User unknown Mar 17 22:07:41.384871 sshd[5133]: pam_unix(sshd:auth): check pass; user unknown Mar 17 22:07:41.384972 sshd[5133]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.110.184.217 Mar 17 22:07:41.385776 sshd[5133]: pam_faillock(sshd:auth): User unknown Mar 17 22:07:41.384000 audit[5133]: USER_AUTH pid=5133 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="lighthouse" exe="/usr/sbin/sshd" hostname=143.110.184.217 addr=143.110.184.217 terminal=ssh res=failed' Mar 17 22:07:41.392658 kernel: audit: type=1100 audit(1742249261.384:1614): pid=5133 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="lighthouse" exe="/usr/sbin/sshd" hostname=143.110.184.217 addr=143.110.184.217 terminal=ssh res=failed' Mar 17 22:07:41.884491 systemd[1]: sshd@21-10.244.26.146:22-36.134.96.76:60516.service: Deactivated successfully. Mar 17 22:07:41.883000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.244.26.146:22-36.134.96.76:60516 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:07:41.893627 kernel: audit: type=1131 audit(1742249261.883:1615): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.244.26.146:22-36.134.96.76:60516 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 22:07:43.406886 sshd[5133]: Failed password for invalid user lighthouse from 143.110.184.217 port 50366 ssh2