uid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c886,c927 key=(null) [ 59.418479] audit: type=1327 audit(1742235562.073:556): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31382E323237002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 [ 59.431469] audit: type=1400 audit(1742235562.073:557): avc: denied { watch } for pid=2633 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=8275 scontext=system_u:system_r:svirt_lxc_net_t:s0:c886,c927 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 [ 59.442459] audit: type=1300 audit(1742235562.073:557): arch=c00000b7 syscall=27 success=no exit=-13 a0=41 a1=400141c6a0 a2=fc6 a3=0 items=0 ppid=2470 pid=2633 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c886,c927 key=(null) [ 59.456474] audit: type=1327 audit(1742235562.073:557): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31382E323237002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 [ 59.469448] audit: type=1400 audit(1742235562.080:558): avc: denied { watch } for pid=2633 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=8278 scontext=system_u:system_r:svirt_lxc_net_t:s0:c886,c927 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 [ 59.481434] audit: type=1300 audit(1742235562.080:558): arch=c00000b7 syscall=27 success=no exit=-13 a0=41 a1=4006cc9290 a2=fc6 a3=0 items=0 ppid=2470 pid=2633 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c886,c927 key=(null) [ 59.494432] audit: type=1327 audit(1742235562.080:558): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31382E323237002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 [ 59.505423] audit: type=1400 audit(1742235562.098:559): avc: denied { watch } for pid=2633 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=8282 scontext=system_u:system_r:svirt_lxc_net_t:s0:c886,c927 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 [ 65.080678] kauditd_printk_skb: 272 callbacks suppressed [ 65.082496] audit: type=1400 audit(1742235567.764:813): avc: denied { watch } for pid=2648 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="nvme0n1p9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c709,c714 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 [ 65.100864] audit: type=1300 audit(1742235567.764:813): arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000db53c0 a2=fc6 a3=0 items=0 ppid=2500 pid=2648 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c709,c714 key=(null) [ 65.112919] audit: type=1327 audit(1742235567.764:813): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 [ 65.931379] audit: type=1400 audit(1742235568.614:814): avc: denied { watch } for pid=2648 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=8275 scontext=system_u:system_r:svirt_lxc_net_t:s0:c709,c714 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 [ 65.942033] audit: type=1300 audit(1742235568.614:814): arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000f7af40 a2=fc6 a3=0 items=0 ppid=2500 pid=2648 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c709,c714 key=(null) [ 65.967645] audit: type=1327 audit(1742235568.614:814): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 [ 65.978524] audit: type=1400 audit(1742235568.622:815): avc: denied { watch } for pid=2648 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=8275 scontext=system_u:system_r:svirt_lxc_net_t:s0:c709,c714 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 [ 65.987736] audit: type=1300 audit(1742235568.622:815): arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000a99b60 a2=fc6 a3=0 items=0 ppid=2500 pid=2648 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c709,c714 key=(null) [ 65.999627] audit: type=1327 audit(1742235568.622:815): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 [ 66.009248] audit: type=1400 audit(1742235568.623:816): avc: denied { watch } for pid=2648 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=8275 scontext=system_u:system_r:svirt_lxc_net_t:s0:c709,c714 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 [ 78.334379] kauditd_printk_skb: 10 callbacks suppressed [ 78.334384] audit: type=1400 audit(1742235581.022:823): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 78.343820] audit: type=1400 audit(1742235581.022:824): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 78.351267] audit: type=1400 audit(1742235581.022:825): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 78.358757] audit: type=1400 audit(1742235581.022:826): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 78.367403] audit: type=1400 audit(1742235581.022:827): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 78.375632] audit: type=1400 audit(1742235581.022:828): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 78.386079] audit: type=1400 audit(1742235581.022:829): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 78.394559] audit: type=1400 audit(1742235581.022:830): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 78.402023] audit: type=1400 audit(1742235581.022:831): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 78.413566] audit: type=1400 audit(1742235581.024:832): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 86.540318] kauditd_printk_skb: 357 callbacks suppressed [ 86.540323] audit: type=1325 audit(1742235589.230:934): table=filter:89 family=2 entries=15 op=nft_register_rule pid=3319 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" [ 86.551187] audit: type=1300 audit(1742235589.230:934): arch=c00000b7 syscall=211 success=yes exit=5908 a0=3 a1=ffffc837f110 a2=0 a3=1 items=0 ppid=3130 pid=3319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) [ 86.566082] audit: type=1327 audit(1742235589.230:934): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 [ 86.573263] audit: type=1325 audit(1742235589.256:935): table=nat:90 family=2 entries=12 op=nft_register_rule pid=3319 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" [ 86.579228] audit: type=1300 audit(1742235589.256:935): arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffc837f110 a2=0 a3=1 items=0 ppid=3130 pid=3319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) [ 86.590506] audit: type=1327 audit(1742235589.256:935): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 [ 86.608464] audit: type=1325 audit(1742235589.298:936): table=filter:91 family=2 entries=16 op=nft_register_rule pid=3321 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" [ 86.613877] audit: type=1300 audit(1742235589.298:936): arch=c00000b7 syscall=211 success=yes exit=5908 a0=3 a1=ffffd7666ad0 a2=0 a3=1 items=0 ppid=3130 pid=3321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) [ 86.625045] audit: type=1327 audit(1742235589.298:936): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 [ 86.633366] audit: type=1325 audit(1742235589.323:937): table=nat:92 family=2 entries=12 op=nft_register_rule pid=3321 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" [ 92.096446] kauditd_printk_skb: 128 callbacks suppressed [ 92.096450] audit: type=1400 audit(1742235594.787:978): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 92.105493] audit: type=1400 audit(1742235594.787:979): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 92.112438] audit: type=1400 audit(1742235594.787:980): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 92.119326] audit: type=1400 audit(1742235594.787:981): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 92.126281] audit: type=1400 audit(1742235594.787:982): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 92.133240] audit: type=1400 audit(1742235594.787:983): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 92.140130] audit: type=1400 audit(1742235594.787:984): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 92.147149] audit: type=1400 audit(1742235594.787:985): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 92.154269] audit: type=1400 audit(1742235594.787:986): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 92.161103] audit: type=1400 audit(1742235594.789:987): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 99.996318] kauditd_printk_skb: 91 callbacks suppressed [ 99.996322] audit: type=1400 audit(1742235602.688:1003): avc: denied { perfmon } for pid=3662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 100.005910] audit: type=1300 audit(1742235602.688:1003): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3435 pid=3662 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) [ 100.017442] audit: type=1327 audit(1742235602.688:1003): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132393438353032343062353139633731363365366433316662623333 [ 100.027281] audit: type=1400 audit(1742235602.688:1004): avc: denied { bpf } for pid=3662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 100.034807] audit: type=1400 audit(1742235602.688:1004): avc: denied { bpf } for pid=3662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 100.042173] audit: type=1400 audit(1742235602.688:1004): avc: denied { bpf } for pid=3662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 100.049561] audit: type=1400 audit(1742235602.688:1004): avc: denied { perfmon } for pid=3662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 100.057033] audit: type=1400 audit(1742235602.688:1004): avc: denied { perfmon } for pid=3662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 100.064152] audit: type=1400 audit(1742235602.688:1004): avc: denied { perfmon } for pid=3662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 100.072368] audit: type=1400 audit(1742235602.688:1004): avc: denied { perfmon } for pid=3662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 109.910761] kauditd_printk_skb: 34 callbacks suppressed [ 109.910766] audit: type=1130 audit(1742235612.604:1010): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.31.18.227:22-139.178.89.65:53610 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 110.092508] audit: type=1101 audit(1742235612.786:1011): pid=4028 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 110.102200] audit: type=1103 audit(1742235612.786:1012): pid=4028 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 110.111370] audit: type=1006 audit(1742235612.786:1013): pid=4028 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=8 res=1 [ 110.116832] audit: type=1300 audit(1742235612.786:1013): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffce6c5ed0 a2=3 a3=1 items=0 ppid=1 pid=4028 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) [ 110.126553] audit: type=1327 audit(1742235612.786:1013): proctitle=737368643A20636F7265205B707269765D [ 110.132089] audit: type=1105 audit(1742235612.825:1014): pid=4028 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 110.145574] audit: type=1103 audit(1742235612.838:1015): pid=4030 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 110.487707] audit: type=1106 audit(1742235613.181:1016): pid=4028 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 110.499716] audit: type=1104 audit(1742235613.181:1017): pid=4028 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 111.742981] wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. [ 111.745745] wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. [ 115.239836] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready [ 115.242123] IPv6: ADDRCONF(NETDEV_CHANGE): cali086a7c8a0fe: link becomes ready [ 115.375449] kauditd_printk_skb: 79 callbacks suppressed [ 115.375453] audit: type=1400 audit(1742235618.067:1032): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 115.384647] audit: type=1400 audit(1742235618.067:1033): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 115.391638] audit: type=1400 audit(1742235618.067:1034): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 115.399307] audit: type=1400 audit(1742235618.067:1035): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 115.406771] audit: type=1400 audit(1742235618.067:1036): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 115.414877] audit: type=1400 audit(1742235618.067:1037): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 115.428401] audit: type=1400 audit(1742235618.067:1038): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 115.435496] audit: type=1400 audit(1742235618.067:1039): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 115.442428] audit: type=1400 audit(1742235618.067:1040): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 115.449306] audit: type=1400 audit(1742235618.067:1041): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 116.952856] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready [ 116.955235] IPv6: ADDRCONF(NETDEV_CHANGE): cali310c03f0f5e: link becomes ready [ 117.128008] IPv6: ADDRCONF(NETDEV_CHANGE): cali31948c990cc: link becomes ready [ 117.382830] IPv6: ADDRCONF(NETDEV_CHANGE): cali14e12bfb612: link becomes ready This is ip-172-31-18-227 (Linux aarch64 5.15.179-flatcar) 18:20:20 SSH host key: SHA256:3RCl8iMLQkKAUq3gFCo7QO8fKe8wlCCtNcOno50InGo (ED25519) SSH host key: SHA256:K9BvKbqwgXCC9yhqa45gxcE6t84Uv6w5+n6KJ5Qzbxs (RSA) SSH host key: SHA256:wk2YAJCGyE+CLnsyG9mwoRFnnPf03Rmc25wESSO4TTQ (ECDSA) eth0: 172.31.18.227 fe80::459:70ff:fe28:6c69 ip-172-31-18-227 login: [ 117.571801] IPv6: ADDRCONF(NETDEV_CHANGE): caliee15961efc4: link becomes ready [ 118.426014] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready [ 118.428641] IPv6: ADDRCONF(NETDEV_CHANGE): cali6f2f5789a42: link becomes ready This is ip-172-31-18-227 (Linux aarch64 5.15.179-flatcar) 18:20:21 SSH host key: SHA256:3RCl8iMLQkKAUq3gFCo7QO8fKe8wlCCtNcOno50InGo (ED25519) SSH host key: SHA256:K9BvKbqwgXCC9yhqa45gxcE6t84Uv6w5+n6KJ5Qzbxs (RSA) SSH host key: SHA256:wk2YAJCGyE+CLnsyG9mwoRFnnPf03Rmc25wESSO4TTQ (ECDSA) eth0: 172.31.18.227 fe80::459:70ff:fe28:6c69 ip-172-31-18-227 login: This is ip-172-31-18-227 (Linux aarch64 5.15.179-flatcar) 18:20:22 SSH host key: SHA256:3RCl8iMLQkKAUq3gFCo7QO8fKe8wlCCtNcOno50InGo (ED25519) SSH host key: SHA256:K9BvKbqwgXCC9yhqa45gxcE6t84Uv6w5+n6KJ5Qzbxs (RSA) SSH host key: SHA256:wk2YAJCGyE+CLnsyG9mwoRFnnPf03Rmc25wESSO4TTQ (ECDSA) eth0: 172.31.18.227 fe80::459:70ff:fe28:6c69 ip-172-31-18-227 login: [ 120.527187] kauditd_printk_skb: 844 callbacks suppressed [ 120.527191] audit: type=1400 audit(1742235623.220:1263): avc: denied { bpf } for pid=5050 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 120.536916] audit: type=1400 audit(1742235623.220:1263): avc: denied { bpf } for pid=5050 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 120.550431] audit: type=1400 audit(1742235623.220:1263): avc: denied { perfmon } for pid=5050 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 120.582807] audit: type=1400 audit(1742235623.220:1263): avc: denied { perfmon } for pid=5050 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 120.592861] audit: type=1400 audit(1742235623.220:1263): avc: denied { perfmon } for pid=5050 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 120.601119] audit: type=1400 audit(1742235623.220:1263): avc: denied { perfmon } for pid=5050 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 120.608405] audit: type=1400 audit(1742235623.220:1263): avc: denied { perfmon } for pid=5050 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 120.610983] audit: audit_backlog=65 > audit_backlog_limit=64 [ 120.615833] audit: type=1400 audit(1742235623.220:1263): avc: denied { bpf } for pid=5050 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 120.623345] audit: audit_lost=2 audit_rate_limit=0 audit_backlog_limit=64 This is ip-172-31-18-227 (Linux aarch64 5.15.179-flatcar) 18:20:23 SSH host key: SHA256:3RCl8iMLQkKAUq3gFCo7QO8fKe8wlCCtNcOno50InGo (ED25519) SSH host key: SHA256:K9BvKbqwgXCC9yhqa45gxcE6t84Uv6w5+n6KJ5Qzbxs (RSA) SSH host key: SHA256:wk2YAJCGyE+CLnsyG9mwoRFnnPf03Rmc25wESSO4TTQ (ECDSA) eth0: 172.31.18.227 fe80::459:70ff:fe28:6c69 ip-172-31-18-227 login: This is ip-172-31-18-227 (Linux aarch64 5.15.179-flatcar) 18:20:25 SSH host key: SHA256:3RCl8iMLQkKAUq3gFCo7QO8fKe8wlCCtNcOno50InGo (ED25519) SSH host key: SHA256:K9BvKbqwgXCC9yhqa45gxcE6t84Uv6w5+n6KJ5Qzbxs (RSA) SSH host key: SHA256:wk2YAJCGyE+CLnsyG9mwoRFnnPf03Rmc25wESSO4TTQ (ECDSA) eth0: 172.31.18.227 fe80::459:70ff:fe28:6c69 ip-172-31-18-227 login: [ 125.923206] kauditd_printk_skb: 244 callbacks suppressed [ 125.923211] audit: type=1400 audit(1742235628.614:1329): avc: denied { watch } for pid=2648 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=8275 scontext=system_u:system_r:svirt_lxc_net_t:s0:c709,c714 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 [ 125.933919] audit: type=1300 audit(1742235628.614:1329): arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=400306be40 a2=fc6 a3=0 items=0 ppid=2500 pid=2648 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c709,c714 key=(null) [ 125.945661] audit: type=1327 audit(1742235628.614:1329): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 [ 125.955429] audit: type=1400 audit(1742235628.624:1330): avc: denied { watch } for pid=2648 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=8275 scontext=system_u:system_r:svirt_lxc_net_t:s0:c709,c714 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 [ 125.966163] audit: type=1300 audit(1742235628.624:1330): arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000e0acc0 a2=fc6 a3=0 items=0 ppid=2500 pid=2648 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c709,c714 key=(null) [ 125.977567] audit: type=1327 audit(1742235628.624:1330): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 [ 125.987522] audit: type=1400 audit(1742235628.624:1331): avc: denied { watch } for pid=2648 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=8275 scontext=system_u:system_r:svirt_lxc_net_t:s0:c709,c714 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 [ 125.996616] audit: type=1300 audit(1742235628.624:1331): arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000e0ace0 a2=fc6 a3=0 items=0 ppid=2500 pid=2648 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c709,c714 key=(null) [ 126.008557] audit: type=1327 audit(1742235628.624:1331): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 [ 126.018517] audit: type=1400 audit(1742235628.624:1332): avc: denied { watch } for pid=2648 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=8275 scontext=system_u:system_r:svirt_lxc_net_t:s0:c709,c714 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 [ 131.532678] kauditd_printk_skb: 161 callbacks suppressed [ 131.532682] audit: type=1400 audit(1742235634.224:1400): avc: denied { perfmon } for pid=5642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 131.546771] audit: type=1300 audit(1742235634.224:1400): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=4733 pid=5642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) [ 131.572496] audit: type=1327 audit(1742235634.224:1400): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734643530636364373033613862643864383831666433346331656333 [ 131.591438] audit: type=1400 audit(1742235634.224:1401): avc: denied { bpf } for pid=5642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 131.598543] audit: type=1400 audit(1742235634.224:1401): avc: denied { bpf } for pid=5642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 131.607750] audit: type=1400 audit(1742235634.224:1401): avc: denied { bpf } for pid=5642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 131.614706] audit: type=1400 audit(1742235634.224:1401): avc: denied { perfmon } for pid=5642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 131.621696] audit: type=1400 audit(1742235634.224:1401): avc: denied { perfmon } for pid=5642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 131.628921] audit: type=1400 audit(1742235634.224:1401): avc: denied { perfmon } for pid=5642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 131.635985] audit: type=1400 audit(1742235634.224:1401): avc: denied { perfmon } for pid=5642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 139.111630] kauditd_printk_skb: 62 callbacks suppressed [ 139.111635] audit: type=1130 audit(1742235641.803:1421): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.31.18.227:22-139.178.89.65:59484 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 139.291798] audit: type=1101 audit(1742235641.984:1422): pid=5713 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 139.304630] audit: type=1103 audit(1742235641.995:1423): pid=5713 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 139.313432] audit: type=1006 audit(1742235641.995:1424): pid=5713 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 [ 139.319804] audit: type=1300 audit(1742235641.995:1424): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc09cbd10 a2=3 a3=1 items=0 ppid=1 pid=5713 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) [ 139.333180] audit: type=1327 audit(1742235641.995:1424): proctitle=737368643A20636F7265205B707269765D [ 139.347723] audit: type=1105 audit(1742235642.039:1425): pid=5713 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 139.360525] audit: type=1103 audit(1742235642.052:1426): pid=5715 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 139.617455] audit: type=1106 audit(1742235642.309:1427): pid=5713 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 139.632235] audit: type=1104 audit(1742235642.309:1428): pid=5713 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 144.646555] kauditd_printk_skb: 1 callbacks suppressed [ 144.646560] audit: type=1130 audit(1742235647.338:1430): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.31.18.227:22-139.178.89.65:59488 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 144.841860] audit: type=1101 audit(1742235647.534:1431): pid=5758 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 144.853674] audit: type=1103 audit(1742235647.545:1432): pid=5758 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 144.863865] audit: type=1006 audit(1742235647.545:1433): pid=5758 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 [ 144.871111] audit: type=1300 audit(1742235647.545:1433): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdbaadb60 a2=3 a3=1 items=0 ppid=1 pid=5758 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) [ 144.883582] audit: type=1327 audit(1742235647.545:1433): proctitle=737368643A20636F7265205B707269765D [ 144.900830] audit: type=1105 audit(1742235647.589:1434): pid=5758 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 144.911148] audit: type=1103 audit(1742235647.592:1435): pid=5760 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 145.143889] audit: type=1106 audit(1742235647.836:1436): pid=5758 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 145.154787] audit: type=1104 audit(1742235647.836:1437): pid=5758 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 150.178534] kauditd_printk_skb: 1 callbacks suppressed [ 150.178540] audit: type=1130 audit(1742235652.870:1439): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-172.31.18.227:22-139.178.89.65:55620 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 150.364148] audit: type=1101 audit(1742235653.056:1440): pid=5772 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 150.373899] audit: type=1103 audit(1742235653.056:1441): pid=5772 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 150.382717] audit: type=1006 audit(1742235653.056:1442): pid=5772 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 [ 150.388051] audit: type=1300 audit(1742235653.056:1442): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd0956000 a2=3 a3=1 items=0 ppid=1 pid=5772 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) [ 150.398138] audit: type=1327 audit(1742235653.056:1442): proctitle=737368643A20636F7265205B707269765D [ 150.419519] audit: type=1105 audit(1742235653.111:1443): pid=5772 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 150.433287] audit: type=1103 audit(1742235653.124:1444): pid=5774 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 150.720868] audit: type=1106 audit(1742235653.413:1445): pid=5772 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 150.732812] audit: type=1104 audit(1742235653.413:1446): pid=5772 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' This is ip-172-31-18-227 (Linux aarch64 5.15.179-flatcar) 18:20:55 SSH host key: SHA256:3RCl8iMLQkKAUq3gFCo7QO8fKe8wlCCtNcOno50InGo (ED25519) SSH host key: SHA256:K9BvKbqwgXCC9yhqa45gxcE6t84Uv6w5+n6KJ5Qzbxs (RSA) SSH host key: SHA256:wk2YAJCGyE+CLnsyG9mwoRFnnPf03Rmc25wESSO4TTQ (ECDSA) eth0: 172.31.18.227 fe80::459:70ff:fe28:6c69 ip-172-31-18-227 login: [ 152.835940] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready [ 152.838133] IPv6: ADDRCONF(NETDEV_CHANGE): caliaef783ff558: link becomes ready This is ip-172-31-18-227 (Linux aarch64 5.15.179-flatcar) 18:20:57 SSH host key: SHA256:3RCl8iMLQkKAUq3gFCo7QO8fKe8wlCCtNcOno50InGo (ED25519) SSH host key: SHA256:K9BvKbqwgXCC9yhqa45gxcE6t84Uv6w5+n6KJ5Qzbxs (RSA) SSH host key: SHA256:wk2YAJCGyE+CLnsyG9mwoRFnnPf03Rmc25wESSO4TTQ (ECDSA) eth0: 172.31.18.227 fe80::459:70ff:fe28:6c69 ip-172-31-18-227 login: [ 155.590939] kauditd_printk_skb: 140 callbacks suppressed [ 155.590945] audit: type=1334 audit(1742235658.282:1495): prog-id=126 op=UNLOAD [ 155.597158] audit: type=1334 audit(1742235658.289:1496): prog-id=129 op=UNLOAD [ 155.708730] audit: type=1334 audit(1742235658.400:1497): prog-id=118 op=UNLOAD [ 155.713143] audit: type=1334 audit(1742235658.405:1498): prog-id=121 op=UNLOAD [ 155.754221] audit: type=1130 audit(1742235658.446:1499): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-172.31.18.227:22-139.178.89.65:55634 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 155.834892] audit: type=1325 audit(1742235658.526:1500): table=filter:124 family=2 entries=8 op=nft_register_rule pid=6118 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" [ 155.852131] audit: type=1300 audit(1742235658.526:1500): arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffebc097b0 a2=0 a3=1 items=0 ppid=3130 pid=6118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) [ 155.863849] audit: type=1327 audit(1742235658.526:1500): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 [ 155.876164] audit: type=1325 audit(1742235658.567:1501): table=nat:125 family=2 entries=32 op=nft_register_chain pid=6118 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" [ 155.881942] audit: type=1300 audit(1742235658.567:1501): arch=c00000b7 syscall=211 success=yes exit=9476 a0=3 a1=ffffebc097b0 a2=0 a3=1 items=0 ppid=3130 pid=6118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) [ 161.146069] kauditd_printk_skb: 556 callbacks suppressed [ 161.146074] audit: type=1325 audit(1742235663.838:1650): table=filter:128 family=2 entries=20 op=nft_register_rule pid=6274 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" [ 161.154800] audit: type=1300 audit(1742235663.838:1650): arch=c00000b7 syscall=211 success=yes exit=11860 a0=3 a1=fffffce35550 a2=0 a3=1 items=0 ppid=3130 pid=6274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) [ 161.165787] audit: type=1327 audit(1742235663.838:1650): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 [ 161.173967] audit: type=1325 audit(1742235663.856:1651): table=nat:129 family=2 entries=22 op=nft_register_rule pid=6274 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" [ 161.181375] audit: type=1300 audit(1742235663.856:1651): arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=fffffce35550 a2=0 a3=1 items=0 ppid=3130 pid=6274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) [ 86.590506] audit: type=1327 audit(1742235589.256:935): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 [ 86.608464] audit: type=1325 audit(1742235589.298:936): table=filter:91 family=2 entries=16 op=nft_register_rule pid=3321 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" [ 86.613877] audit: type=1300 audit(1742235589.298:936): arch=c00000b7 syscall=211 success=yes exit=5908 a0=3 a1=ffffd7666ad0 a2=0 a3=1 items=0 ppid=3130 pid=3321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) [ 86.625045] audit: type=1327 audit(1742235589.298:936): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 [ 86.633366] audit: type=1325 audit(1742235589.323:937): table=nat:92 family=2 entries=12 op=nft_register_rule pid=3321 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" [ 92.096446] kauditd_printk_skb: 128 callbacks suppressed [ 92.096450] audit: type=1400 audit(1742235594.787:978): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 92.105493] audit: type=1400 audit(1742235594.787:979): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 92.112438] audit: type=1400 audit(1742235594.787:980): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 92.119326] audit: type=1400 audit(1742235594.787:981): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 92.126281] audit: type=1400 audit(1742235594.787:982): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 92.133240] audit: type=1400 audit(1742235594.787:983): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 92.140130] audit: type=1400 audit(1742235594.787:984): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 92.147149] audit: type=1400 audit(1742235594.787:985): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 92.154269] audit: type=1400 audit(1742235594.787:986): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 92.161103] audit: type=1400 audit(1742235594.789:987): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 99.996318] kauditd_printk_skb: 91 callbacks suppressed [ 99.996322] audit: type=1400 audit(1742235602.688:1003): avc: denied { perfmon } for pid=3662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 100.005910] audit: type=1300 audit(1742235602.688:1003): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3435 pid=3662 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) [ 100.017442] audit: type=1327 audit(1742235602.688:1003): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132393438353032343062353139633731363365366433316662623333 [ 100.027281] audit: type=1400 audit(1742235602.688:1004): avc: denied { bpf } for pid=3662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 100.034807] audit: type=1400 audit(1742235602.688:1004): avc: denied { bpf } for pid=3662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 100.042173] audit: type=1400 audit(1742235602.688:1004): avc: denied { bpf } for pid=3662 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 100.049561] audit: type=1400 audit(1742235602.688:1004): avc: denied { perfmon } for pid=3662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 100.057033] audit: type=1400 audit(1742235602.688:1004): avc: denied { perfmon } for pid=3662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 100.064152] audit: type=1400 audit(1742235602.688:1004): avc: denied { perfmon } for pid=3662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 100.072368] audit: type=1400 audit(1742235602.688:1004): avc: denied { perfmon } for pid=3662 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 109.910761] kauditd_printk_skb: 34 callbacks suppressed [ 109.910766] audit: type=1130 audit(1742235612.604:1010): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.31.18.227:22-139.178.89.65:53610 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 110.092508] audit: type=1101 audit(1742235612.786:1011): pid=4028 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 110.102200] audit: type=1103 audit(1742235612.786:1012): pid=4028 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 110.111370] audit: type=1006 audit(1742235612.786:1013): pid=4028 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=8 res=1 [ 110.116832] audit: type=1300 audit(1742235612.786:1013): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffce6c5ed0 a2=3 a3=1 items=0 ppid=1 pid=4028 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) [ 110.126553] audit: type=1327 audit(1742235612.786:1013): proctitle=737368643A20636F7265205B707269765D [ 110.132089] audit: type=1105 audit(1742235612.825:1014): pid=4028 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 110.145574] audit: type=1103 audit(1742235612.838:1015): pid=4030 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 110.487707] audit: type=1106 audit(1742235613.181:1016): pid=4028 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 110.499716] audit: type=1104 audit(1742235613.181:1017): pid=4028 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 111.742981] wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. [ 111.745745] wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. [ 115.239836] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready [ 115.242123] IPv6: ADDRCONF(NETDEV_CHANGE): cali086a7c8a0fe: link becomes ready [ 115.375449] kauditd_printk_skb: 79 callbacks suppressed [ 115.375453] audit: type=1400 audit(1742235618.067:1032): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 115.384647] audit: type=1400 audit(1742235618.067:1033): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 115.391638] audit: type=1400 audit(1742235618.067:1034): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 115.399307] audit: type=1400 audit(1742235618.067:1035): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 115.406771] audit: type=1400 audit(1742235618.067:1036): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 115.414877] audit: type=1400 audit(1742235618.067:1037): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 115.428401] audit: type=1400 audit(1742235618.067:1038): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 115.435496] audit: type=1400 audit(1742235618.067:1039): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 115.442428] audit: type=1400 audit(1742235618.067:1040): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 115.449306] audit: type=1400 audit(1742235618.067:1041): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 116.952856] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready [ 116.955235] IPv6: ADDRCONF(NETDEV_CHANGE): cali310c03f0f5e: link becomes ready [ 117.128008] IPv6: ADDRCONF(NETDEV_CHANGE): cali31948c990cc: link becomes ready [ 117.382830] IPv6: ADDRCONF(NETDEV_CHANGE): cali14e12bfb612: link becomes ready This is ip-172-31-18-227 (Linux aarch64 5.15.179-flatcar) 18:20:20 SSH host key: SHA256:3RCl8iMLQkKAUq3gFCo7QO8fKe8wlCCtNcOno50InGo (ED25519) SSH host key: SHA256:K9BvKbqwgXCC9yhqa45gxcE6t84Uv6w5+n6KJ5Qzbxs (RSA) SSH host key: SHA256:wk2YAJCGyE+CLnsyG9mwoRFnnPf03Rmc25wESSO4TTQ (ECDSA) eth0: 172.31.18.227 fe80::459:70ff:fe28:6c69 ip-172-31-18-227 login: [ 117.571801] IPv6: ADDRCONF(NETDEV_CHANGE): caliee15961efc4: link becomes ready [ 118.426014] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready [ 118.428641] IPv6: ADDRCONF(NETDEV_CHANGE): cali6f2f5789a42: link becomes ready This is ip-172-31-18-227 (Linux aarch64 5.15.179-flatcar) 18:20:21 SSH host key: SHA256:3RCl8iMLQkKAUq3gFCo7QO8fKe8wlCCtNcOno50InGo (ED25519) SSH host key: SHA256:K9BvKbqwgXCC9yhqa45gxcE6t84Uv6w5+n6KJ5Qzbxs (RSA) SSH host key: SHA256:wk2YAJCGyE+CLnsyG9mwoRFnnPf03Rmc25wESSO4TTQ (ECDSA) eth0: 172.31.18.227 fe80::459:70ff:fe28:6c69 ip-172-31-18-227 login: This is ip-172-31-18-227 (Linux aarch64 5.15.179-flatcar) 18:20:22 SSH host key: SHA256:3RCl8iMLQkKAUq3gFCo7QO8fKe8wlCCtNcOno50InGo (ED25519) SSH host key: SHA256:K9BvKbqwgXCC9yhqa45gxcE6t84Uv6w5+n6KJ5Qzbxs (RSA) SSH host key: SHA256:wk2YAJCGyE+CLnsyG9mwoRFnnPf03Rmc25wESSO4TTQ (ECDSA) eth0: 172.31.18.227 fe80::459:70ff:fe28:6c69 ip-172-31-18-227 login: [ 120.527187] kauditd_printk_skb: 844 callbacks suppressed [ 120.527191] audit: type=1400 audit(1742235623.220:1263): avc: denied { bpf } for pid=5050 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 120.536916] audit: type=1400 audit(1742235623.220:1263): avc: denied { bpf } for pid=5050 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 120.550431] audit: type=1400 audit(1742235623.220:1263): avc: denied { perfmon } for pid=5050 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 120.582807] audit: type=1400 audit(1742235623.220:1263): avc: denied { perfmon } for pid=5050 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 120.592861] audit: type=1400 audit(1742235623.220:1263): avc: denied { perfmon } for pid=5050 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 120.601119] audit: type=1400 audit(1742235623.220:1263): avc: denied { perfmon } for pid=5050 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 120.608405] audit: type=1400 audit(1742235623.220:1263): avc: denied { perfmon } for pid=5050 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 120.610983] audit: audit_backlog=65 > audit_backlog_limit=64 [ 120.615833] audit: type=1400 audit(1742235623.220:1263): avc: denied { bpf } for pid=5050 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 120.623345] audit: audit_lost=2 audit_rate_limit=0 audit_backlog_limit=64 This is ip-172-31-18-227 (Linux aarch64 5.15.179-flatcar) 18:20:23 SSH host key: SHA256:3RCl8iMLQkKAUq3gFCo7QO8fKe8wlCCtNcOno50InGo (ED25519) SSH host key: SHA256:K9BvKbqwgXCC9yhqa45gxcE6t84Uv6w5+n6KJ5Qzbxs (RSA) SSH host key: SHA256:wk2YAJCGyE+CLnsyG9mwoRFnnPf03Rmc25wESSO4TTQ (ECDSA) eth0: 172.31.18.227 fe80::459:70ff:fe28:6c69 ip-172-31-18-227 login: This is ip-172-31-18-227 (Linux aarch64 5.15.179-flatcar) 18:20:25 SSH host key: SHA256:3RCl8iMLQkKAUq3gFCo7QO8fKe8wlCCtNcOno50InGo (ED25519) SSH host key: SHA256:K9BvKbqwgXCC9yhqa45gxcE6t84Uv6w5+n6KJ5Qzbxs (RSA) SSH host key: SHA256:wk2YAJCGyE+CLnsyG9mwoRFnnPf03Rmc25wESSO4TTQ (ECDSA) eth0: 172.31.18.227 fe80::459:70ff:fe28:6c69 ip-172-31-18-227 login: [ 125.923206] kauditd_printk_skb: 244 callbacks suppressed [ 125.923211] audit: type=1400 audit(1742235628.614:1329): avc: denied { watch } for pid=2648 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=8275 scontext=system_u:system_r:svirt_lxc_net_t:s0:c709,c714 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 [ 125.933919] audit: type=1300 audit(1742235628.614:1329): arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=400306be40 a2=fc6 a3=0 items=0 ppid=2500 pid=2648 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c709,c714 key=(null) [ 125.945661] audit: type=1327 audit(1742235628.614:1329): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 [ 125.955429] audit: type=1400 audit(1742235628.624:1330): avc: denied { watch } for pid=2648 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=8275 scontext=system_u:system_r:svirt_lxc_net_t:s0:c709,c714 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 [ 125.966163] audit: type=1300 audit(1742235628.624:1330): arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000e0acc0 a2=fc6 a3=0 items=0 ppid=2500 pid=2648 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c709,c714 key=(null) [ 125.977567] audit: type=1327 audit(1742235628.624:1330): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 [ 125.987522] audit: type=1400 audit(1742235628.624:1331): avc: denied { watch } for pid=2648 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=8275 scontext=system_u:system_r:svirt_lxc_net_t:s0:c709,c714 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 [ 125.996616] audit: type=1300 audit(1742235628.624:1331): arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000e0ace0 a2=fc6 a3=0 items=0 ppid=2500 pid=2648 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c709,c714 key=(null) [ 126.008557] audit: type=1327 audit(1742235628.624:1331): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 [ 126.018517] audit: type=1400 audit(1742235628.624:1332): avc: denied { watch } for pid=2648 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=8275 scontext=system_u:system_r:svirt_lxc_net_t:s0:c709,c714 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 [ 131.532678] kauditd_printk_skb: 161 callbacks suppressed [ 131.532682] audit: type=1400 audit(1742235634.224:1400): avc: denied { perfmon } for pid=5642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 131.546771] audit: type=1300 audit(1742235634.224:1400): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=4733 pid=5642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) [ 131.572496] audit: type=1327 audit(1742235634.224:1400): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734643530636364373033613862643864383831666433346331656333 [ 131.591438] audit: type=1400 audit(1742235634.224:1401): avc: denied { bpf } for pid=5642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 131.598543] audit: type=1400 audit(1742235634.224:1401): avc: denied { bpf } for pid=5642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 131.607750] audit: type=1400 audit(1742235634.224:1401): avc: denied { bpf } for pid=5642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 131.614706] audit: type=1400 audit(1742235634.224:1401): avc: denied { perfmon } for pid=5642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 131.621696] audit: type=1400 audit(1742235634.224:1401): avc: denied { perfmon } for pid=5642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 131.628921] audit: type=1400 audit(1742235634.224:1401): avc: denied { perfmon } for pid=5642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 131.635985] audit: type=1400 audit(1742235634.224:1401): avc: denied { perfmon } for pid=5642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 139.111630] kauditd_printk_skb: 62 callbacks suppressed [ 139.111635] audit: type=1130 audit(1742235641.803:1421): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.31.18.227:22-139.178.89.65:59484 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 139.291798] audit: type=1101 audit(1742235641.984:1422): pid=5713 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 139.304630] audit: type=1103 audit(1742235641.995:1423): pid=5713 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 139.313432] audit: type=1006 audit(1742235641.995:1424): pid=5713 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 [ 139.319804] audit: type=1300 audit(1742235641.995:1424): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc09cbd10 a2=3 a3=1 items=0 ppid=1 pid=5713 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) [ 139.333180] audit: type=1327 audit(1742235641.995:1424): proctitle=737368643A20636F7265205B707269765D [ 139.347723] audit: type=1105 audit(1742235642.039:1425): pid=5713 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 139.360525] audit: type=1103 audit(1742235642.052:1426): pid=5715 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 139.617455] audit: type=1106 audit(1742235642.309:1427): pid=5713 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 139.632235] audit: type=1104 audit(1742235642.309:1428): pid=5713 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 144.646555] kauditd_printk_skb: 1 callbacks suppressed [ 144.646560] audit: type=1130 audit(1742235647.338:1430): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.31.18.227:22-139.178.89.65:59488 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 144.841860] audit: type=1101 audit(1742235647.534:1431): pid=5758 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 144.853674] audit: type=1103 audit(1742235647.545:1432): pid=5758 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 144.863865] audit: type=1006 audit(1742235647.545:1433): pid=5758 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 [ 144.871111] audit: type=1300 audit(1742235647.545:1433): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdbaadb60 a2=3 a3=1 items=0 ppid=1 pid=5758 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) [ 144.883582] audit: type=1327 audit(1742235647.545:1433): proctitle=737368643A20636F7265205B707269765D [ 144.900830] audit: type=1105 audit(1742235647.589:1434): pid=5758 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 144.911148] audit: type=1103 audit(1742235647.592:1435): pid=5760 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 145.143889] audit: type=1106 audit(1742235647.836:1436): pid=5758 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 145.154787] audit: type=1104 audit(1742235647.836:1437): pid=5758 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 150.178534] kauditd_printk_skb: 1 callbacks suppressed [ 150.178540] audit: type=1130 audit(1742235652.870:1439): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-172.31.18.227:22-139.178.89.65:55620 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 150.364148] audit: type=1101 audit(1742235653.056:1440): pid=5772 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 150.373899] audit: type=1103 audit(1742235653.056:1441): pid=5772 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 150.382717] audit: type=1006 audit(1742235653.056:1442): pid=5772 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 [ 150.388051] audit: type=1300 audit(1742235653.056:1442): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd0956000 a2=3 a3=1 items=0 ppid=1 pid=5772 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) [ 150.398138] audit: type=1327 audit(1742235653.056:1442): proctitle=737368643A20636F7265205B707269765D [ 150.419519] audit: type=1105 audit(1742235653.111:1443): pid=5772 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 150.433287] audit: type=1103 audit(1742235653.124:1444): pid=5774 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 150.720868] audit: type=1106 audit(1742235653.413:1445): pid=5772 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 150.732812] audit: type=1104 audit(1742235653.413:1446): pid=5772 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' This is ip-172-31-18-227 (Linux aarch64 5.15.179-flatcar) 18:20:55 SSH host key: SHA256:3RCl8iMLQkKAUq3gFCo7QO8fKe8wlCCtNcOno50InGo (ED25519) SSH host key: SHA256:K9BvKbqwgXCC9yhqa45gxcE6t84Uv6w5+n6KJ5Qzbxs (RSA) SSH host key: SHA256:wk2YAJCGyE+CLnsyG9mwoRFnnPf03Rmc25wESSO4TTQ (ECDSA) eth0: 172.31.18.227 fe80::459:70ff:fe28:6c69 ip-172-31-18-227 login: [ 152.835940] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready [ 152.838133] IPv6: ADDRCONF(NETDEV_CHANGE): caliaef783ff558: link becomes ready This is ip-172-31-18-227 (Linux aarch64 5.15.179-flatcar) 18:20:57 SSH host key: SHA256:3RCl8iMLQkKAUq3gFCo7QO8fKe8wlCCtNcOno50InGo (ED25519) SSH host key: SHA256:K9BvKbqwgXCC9yhqa45gxcE6t84Uv6w5+n6KJ5Qzbxs (RSA) SSH host key: SHA256:wk2YAJCGyE+CLnsyG9mwoRFnnPf03Rmc25wESSO4TTQ (ECDSA) eth0: 172.31.18.227 fe80::459:70ff:fe28:6c69 ip-172-31-18-227 login: [ 155.590939] kauditd_printk_skb: 140 callbacks suppressed [ 155.590945] audit: type=1334 audit(1742235658.282:1495): prog-id=126 op=UNLOAD [ 155.597158] audit: type=1334 audit(1742235658.289:1496): prog-id=129 op=UNLOAD [ 155.708730] audit: type=1334 audit(1742235658.400:1497): prog-id=118 op=UNLOAD [ 155.713143] audit: type=1334 audit(1742235658.405:1498): prog-id=121 op=UNLOAD [ 155.754221] audit: type=1130 audit(1742235658.446:1499): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-172.31.18.227:22-139.178.89.65:55634 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 155.834892] audit: type=1325 audit(1742235658.526:1500): table=filter:124 family=2 entries=8 op=nft_register_rule pid=6118 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" [ 155.852131] audit: type=1300 audit(1742235658.526:1500): arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffebc097b0 a2=0 a3=1 items=0 ppid=3130 pid=6118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) [ 155.863849] audit: type=1327 audit(1742235658.526:1500): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 [ 155.876164] audit: type=1325 audit(1742235658.567:1501): table=nat:125 family=2 entries=32 op=nft_register_chain pid=6118 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" [ 155.881942] audit: type=1300 audit(1742235658.567:1501): arch=c00000b7 syscall=211 success=yes exit=9476 a0=3 a1=ffffebc097b0 a2=0 a3=1 items=0 ppid=3130 pid=6118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) [ 161.146069] kauditd_printk_skb: 556 callbacks suppressed [ 161.146074] audit: type=1325 audit(1742235663.838:1650): table=filter:128 family=2 entries=20 op=nft_register_rule pid=6274 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" [ 161.154800] audit: type=1300 audit(1742235663.838:1650): arch=c00000b7 syscall=211 success=yes exit=11860 a0=3 a1=fffffce35550 a2=0 a3=1 items=0 ppid=3130 pid=6274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) [ 161.165787] audit: type=1327 audit(1742235663.838:1650): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 [ 161.173967] audit: type=1325 audit(1742235663.856:1651): table=nat:129 family=2 entries=22 op=nft_register_rule pid=6274 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" [ 161.181375] audit: type=1300 audit(1742235663.856:1651): arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=fffffce35550 a2=0 a3=1 items=0 ppid=3130 pid=6274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) [ 161.196185] audit: type=1327 audit(1742235663.856:1651): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 [ 161.202434] audit: type=1106 audit(1742235663.894:1652): pid=6203 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 161.222740] audit: type=1104 audit(1742235663.895:1653): pid=6203 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 161.248447] audit: type=1131 audit(1742235663.906:1654): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-172.31.18.227:22-139.178.89.65:55650 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 161.261102] audit: type=1325 audit(1742235663.923:1655): table=filter:130 family=2 entries=32 op=nft_register_rule pid=6278 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" [ 167.601728] kauditd_printk_skb: 27 callbacks suppressed [ 167.601733] audit: type=1130 audit(1742235670.294:1675): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-172.31.18.227:22-139.178.89.65:41020 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 167.776378] audit: type=1101 audit(1742235670.469:1676): pid=6396 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 167.788696] audit: type=1103 audit(1742235670.480:1677): pid=6396 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 167.797708] audit: type=1006 audit(1742235670.480:1678): pid=6396 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 [ 167.803594] audit: type=1300 audit(1742235670.480:1678): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffffc03c70 a2=3 a3=1 items=0 ppid=1 pid=6396 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) [ 167.812990] audit: type=1327 audit(1742235670.480:1678): proctitle=737368643A20636F7265205B707269765D [ 167.834037] audit: type=1105 audit(1742235670.526:1679): pid=6396 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 167.844352] audit: type=1103 audit(1742235670.529:1680): pid=6404 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 168.084474] audit: type=1106 audit(1742235670.777:1681): pid=6396 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 168.101706] audit: type=1104 audit(1742235670.777:1682): pid=6396 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 173.112156] kauditd_printk_skb: 7 callbacks suppressed [ 173.112161] audit: type=1130 audit(1742235675.805:1686): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-172.31.18.227:22-139.178.89.65:55882 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 173.287485] audit: type=1101 audit(1742235675.980:1687): pid=6508 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 173.299636] audit: type=1103 audit(1742235675.992:1688): pid=6508 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 173.308928] audit: type=1006 audit(1742235675.992:1689): pid=6508 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 [ 173.314519] audit: type=1300 audit(1742235675.992:1689): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffcb271980 a2=3 a3=1 items=0 ppid=1 pid=6508 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) [ 173.324033] audit: type=1327 audit(1742235675.992:1689): proctitle=737368643A20636F7265205B707269765D [ 173.346890] audit: type=1105 audit(1742235676.039:1690): pid=6508 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 173.357955] audit: type=1103 audit(1742235676.051:1691): pid=6510 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 173.619152] audit: type=1106 audit(1742235676.312:1692): pid=6508 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 173.630219] audit: type=1104 audit(1742235676.323:1693): pid=6508 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 178.649734] kauditd_printk_skb: 1 callbacks suppressed [ 178.649739] audit: type=1130 audit(1742235681.343:1695): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-172.31.18.227:22-139.178.89.65:36434 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 178.828262] audit: type=1101 audit(1742235681.521:1696): pid=6626 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 178.837640] audit: type=1103 audit(1742235681.524:1697): pid=6626 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 178.847137] audit: type=1006 audit(1742235681.524:1698): pid=6626 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 [ 178.852975] audit: type=1300 audit(1742235681.524:1698): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd5113f30 a2=3 a3=1 items=0 ppid=1 pid=6626 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) [ 178.863477] audit: type=1327 audit(1742235681.524:1698): proctitle=737368643A20636F7265205B707269765D [ 178.886584] audit: type=1105 audit(1742235681.579:1699): pid=6626 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 178.896904] audit: type=1103 audit(1742235681.580:1700): pid=6633 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 179.154434] audit: type=1106 audit(1742235681.847:1701): pid=6626 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 179.168061] audit: type=1104 audit(1742235681.848:1702): pid=6626 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 183.937133] kauditd_printk_skb: 27 callbacks suppressed [ 183.937137] audit: type=1400 audit(1742235686.630:1714): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 183.946121] audit: type=1400 audit(1742235686.630:1715): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 183.953134] audit: type=1400 audit(1742235686.630:1716): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 183.960970] audit: type=1400 audit(1742235686.630:1717): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 183.968309] audit: type=1400 audit(1742235686.630:1718): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 183.977030] audit: type=1400 audit(1742235686.630:1719): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 183.984917] audit: type=1400 audit(1742235686.630:1720): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 183.992533] audit: type=1400 audit(1742235686.630:1721): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 184.001218] audit: type=1400 audit(1742235686.630:1722): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 184.008627] audit: type=1400 audit(1742235686.632:1723): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 189.012741] kauditd_printk_skb: 201 callbacks suppressed [ 189.012746] audit: type=1400 audit(1742235691.706:1765): avc: denied { write } for pid=7180 comm="tee" name="fd" dev="proc" ino=33285 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 [ 189.022922] audit: type=1300 audit(1742235691.706:1765): arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffdeae3a18 a2=241 a3=1b6 items=1 ppid=7148 pid=7180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) [ 189.036775] audit: type=1307 audit(1742235691.706:1765): cwd="/etc/service/enabled/confd/log" [ 189.039882] audit: type=1302 audit(1742235691.706:1765): item=0 name="/dev/fd/63" inode=33279 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 [ 189.047951] audit: type=1327 audit(1742235691.706:1765): proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 [ 189.055303] audit: type=1400 audit(1742235691.716:1766): avc: denied { write } for pid=7192 comm="tee" name="fd" dev="proc" ino=33891 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 [ 189.062308] audit: type=1300 audit(1742235691.716:1766): arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffffdec7a1a a2=241 a3=1b6 items=1 ppid=7145 pid=7192 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) [ 189.074071] audit: type=1307 audit(1742235691.716:1766): cwd="/etc/service/enabled/cni/log" [ 189.077260] audit: type=1302 audit(1742235691.716:1766): item=0 name="/dev/fd/63" inode=33880 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 [ 189.085280] audit: type=1327 audit(1742235691.716:1766): proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 [ 195.260357] kauditd_printk_skb: 510 callbacks suppressed [ 195.260361] audit: type=1130 audit(1742235697.954:1874): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-172.31.18.227:22-139.178.89.65:34692 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 195.438557] audit: type=1101 audit(1742235698.132:1875): pid=7356 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 195.449679] audit: type=1103 audit(1742235698.143:1876): pid=7356 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 195.458331] audit: type=1006 audit(1742235698.144:1877): pid=7356 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=28 res=1 [ 195.464034] audit: type=1300 audit(1742235698.144:1877): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffeeb1c920 a2=3 a3=1 items=0 ppid=1 pid=7356 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) [ 195.473850] audit: type=1327 audit(1742235698.144:1877): proctitle=737368643A20636F7265205B707269765D [ 195.488563] audit: type=1105 audit(1742235698.176:1878): pid=7356 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 195.498817] audit: type=1103 audit(1742235698.179:1879): pid=7366 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 195.742562] audit: type=1106 audit(1742235698.436:1880): pid=7356 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 195.753619] audit: type=1104 audit(1742235698.437:1881): pid=7356 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 200.768458] kauditd_printk_skb: 1 callbacks suppressed [ 200.768463] audit: type=1130 audit(1742235703.463:1883): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-172.31.18.227:22-139.178.89.65:40964 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' [ 200.946072] audit: type=1101 audit(1742235703.640:1884): pid=7387 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 200.955728] audit: type=1103 audit(1742235703.643:1885): pid=7387 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 200.965790] audit: type=1006 audit(1742235703.643:1886): pid=7387 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=29 res=1 [ 200.971561] audit: type=1300 audit(1742235703.643:1886): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffebda85f0 a2=3 a3=1 items=0 ppid=1 pid=7387 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=29 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) [ 200.982285] audit: type=1327 audit(1742235703.643:1886): proctitle=737368643A20636F7265205B707269765D [ 200.993775] audit: type=1105 audit(1742235703.688:1887): pid=7387 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 201.004112] audit: type=1103 audit(1742235703.688:1888): pid=7389 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 201.243811] audit: type=1106 audit(1742235703.938:1889): pid=7387 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 201.255097] audit: type=1104 audit(1742235703.940:1890): pid=7387 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.89.65 addr=139.178.89.65 terminal=ssh res=success' [ 210.560158] kauditd_printk_skb: 1 callbacks suppressed [ 210.560162] audit: type=1400 audit(1742235713.255:1892): avc: denied { bpf } for pid=7499 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 210.568734] audit: type=1400 audit(1742235713.255:1892): avc: denied { bpf } for pid=7499 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 210.575478] audit: type=1400 audit(1742235713.255:1892): avc: denied { perfmon } for pid=7499 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 210.582584] audit: type=1400 audit(1742235713.255:1892): avc: denied { perfmon } for pid=7499 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 210.589637] audit: type=1400 audit(1742235713.255:1892): avc: denied { perfmon } for pid=7499 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 210.596619] audit: type=1400 audit(1742235713.255:1892): avc: denied { perfmon } for pid=7499 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 210.604223] audit: type=1400 audit(1742235713.255:1892): avc: denied { perfmon } for pid=7499 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 210.611782] audit: type=1400 audit(1742235713.255:1892): avc: denied { bpf } for pid=7499 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 210.618684] audit: type=1400 audit(1742235713.255:1892): avc: denied { bpf } for pid=7499 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 210.626363] audit: type=1334 audit(1742235713.255:1892): prog-id=261 op=LOAD [ 226.346096] kauditd_printk_skb: 513 callbacks suppressed [ 226.346101] audit: type=1334 audit(1742235729.042:2016): prog-id=81 op=UNLOAD [ 226.350699] audit: type=1334 audit(1742235729.042:2017): prog-id=97 op=UNLOAD [ 226.586918] audit: type=1400 audit(1742235729.283:2018): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 226.593505] audit: type=1400 audit(1742235729.287:2019): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 226.600481] audit: type=1400 audit(1742235729.287:2020): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 226.607124] audit: type=1400 audit(1742235729.287:2021): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 226.613969] audit: type=1400 audit(1742235729.287:2022): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 226.621888] audit: type=1400 audit(1742235729.287:2023): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 226.628832] audit: type=1400 audit(1742235729.287:2024): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 226.635833] audit: type=1400 audit(1742235729.287:2025): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 231.469508] kauditd_printk_skb: 114 callbacks suppressed [ 231.469513] audit: type=1334 audit(1742235734.166:2058): prog-id=80 op=UNLOAD [ 231.475080] audit: type=1334 audit(1742235734.166:2059): prog-id=82 op=UNLOAD [ 232.622327] audit: type=1400 audit(1742235735.319:2060): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 232.629360] audit: type=1400 audit(1742235735.319:2061): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 232.636443] audit: type=1400 audit(1742235735.319:2062): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 232.643264] audit: type=1400 audit(1742235735.319:2063): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 232.650242] audit: type=1400 audit(1742235735.319:2064): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 232.657139] audit: type=1400 audit(1742235735.319:2065): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 232.664974] audit: type=1400 audit(1742235735.319:2066): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 232.672707] audit: type=1400 audit(1742235735.319:2067): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 [ 239.379888] kauditd_printk_skb: 49 callbacks suppressed [ 239.379893] audit: type=1400 audit(1742235742.078:2078): avc: denied { watch } for pid=2633 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="nvme0n1p9" ino=8280 scontext=system_u:system_r:svirt_lxc_net_t:s0:c886,c927 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 [ 239.390597] audit: type=1300 audit(1742235742.078:2078): arch=c00000b7 syscall=27 success=no exit=-13 a0=4c a1=4009005b00 a2=fc6 a3=0 items=0 ppid=2470 pid=2633 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c886,c927 key=(null) [ 239.401402] audit: type=1327 audit(1742235742.078:2078): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31382E323237002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 [ 239.410658] audit: type=1400 audit(1742235742.078:2079): avc: denied { watch } for pid=2633 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="nvme0n1p9" ino=8275 scontext=system_u:system_r:svirt_lxc_net_t:s0:c886,c927 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 [ 239.419043] audit: type=1300 audit(1742235742.078:2079): arch=c00000b7 syscall=27 success=no exit=-13 a0=6a a1=400dced3a0 a2=fc6 a3=0 items=0 ppid=2470 pid=2633 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c886,c927 key=(null) [ 239.429865] audit: type=1327 audit(1742235742.078:2079): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31382E323237002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 [ 239.439158] audit: type=1400 audit(1742235742.083:2080): avc: denied { watch } for pid=2633 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="nvme0n1p9" ino=8278 scontext=system_u:system_r:svirt_lxc_net_t:s0:c886,c927 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 [ 239.447861] audit: type=1300 audit(1742235742.083:2080): arch=c00000b7 syscall=27 success=no exit=-13 a0=4c a1=40091a0fc0 a2=fc6 a3=0 items=0 ppid=2470 pid=2633 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c886,c927 key=(null) [ 239.458645] audit: type=1327 audit(1742235742.083:2080): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E33312E31382E323237002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 [ 239.467873] audit: type=1400 audit(1742235742.102:2081): avc: denied { watch } for pid=2633 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="nvme0n1p9" ino=8282 scontext=system_u:system_r:svirt_lxc_net_t:s0:c886,c927 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0