Oct 29 04:39:10.166330 kernel: Linux version 5.15.192-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Tue Oct 28 23:40:27 -00 2025 Oct 29 04:39:10.166378 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=201610a31b2ff0ec76573eccf3918f182ba51086e5a85b3aea8675643c4efef7 Oct 29 04:39:10.166397 kernel: BIOS-provided physical RAM map: Oct 29 04:39:10.166407 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Oct 29 04:39:10.166417 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Oct 29 04:39:10.166426 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Oct 29 04:39:10.166437 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000007ffdbfff] usable Oct 29 04:39:10.166447 kernel: BIOS-e820: [mem 0x000000007ffdc000-0x000000007fffffff] reserved Oct 29 04:39:10.166456 kernel: BIOS-e820: [mem 0x00000000b0000000-0x00000000bfffffff] reserved Oct 29 04:39:10.166466 kernel: BIOS-e820: [mem 0x00000000fed1c000-0x00000000fed1ffff] reserved Oct 29 04:39:10.166480 kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved Oct 29 04:39:10.166490 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Oct 29 04:39:10.166500 kernel: NX (Execute Disable) protection: active Oct 29 04:39:10.166510 kernel: SMBIOS 2.8 present. Oct 29 04:39:10.166521 kernel: DMI: Red Hat KVM/RHEL-AV, BIOS 1.13.0-2.module_el8.5.0+2608+72063365 04/01/2014 Oct 29 04:39:10.166532 kernel: Hypervisor detected: KVM Oct 29 04:39:10.166546 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Oct 29 04:39:10.166557 kernel: kvm-clock: cpu 0, msr 5c1a0001, primary cpu clock Oct 29 04:39:10.166573 kernel: kvm-clock: using sched offset of 5137604310 cycles Oct 29 04:39:10.166585 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Oct 29 04:39:10.166596 kernel: tsc: Detected 2799.998 MHz processor Oct 29 04:39:10.166629 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Oct 29 04:39:10.166640 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Oct 29 04:39:10.166651 kernel: last_pfn = 0x7ffdc max_arch_pfn = 0x400000000 Oct 29 04:39:10.166661 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Oct 29 04:39:10.166677 kernel: Using GB pages for direct mapping Oct 29 04:39:10.166688 kernel: ACPI: Early table checksum verification disabled Oct 29 04:39:10.166698 kernel: ACPI: RSDP 0x00000000000F5AA0 000014 (v00 BOCHS ) Oct 29 04:39:10.166709 kernel: ACPI: RSDT 0x000000007FFE47A5 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) Oct 29 04:39:10.166719 kernel: ACPI: FACP 0x000000007FFE438D 0000F4 (v03 BOCHS BXPC 00000001 BXPC 00000001) Oct 29 04:39:10.166730 kernel: ACPI: DSDT 0x000000007FFDFD80 00460D (v01 BOCHS BXPC 00000001 BXPC 00000001) Oct 29 04:39:10.166740 kernel: ACPI: FACS 0x000000007FFDFD40 000040 Oct 29 04:39:10.166751 kernel: ACPI: APIC 0x000000007FFE4481 0000F0 (v01 BOCHS BXPC 00000001 BXPC 00000001) Oct 29 04:39:10.166762 kernel: ACPI: SRAT 0x000000007FFE4571 0001D0 (v01 BOCHS BXPC 00000001 BXPC 00000001) Oct 29 04:39:10.166776 kernel: ACPI: MCFG 0x000000007FFE4741 00003C (v01 BOCHS BXPC 00000001 BXPC 00000001) Oct 29 04:39:10.166787 kernel: ACPI: WAET 0x000000007FFE477D 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) Oct 29 04:39:10.166807 kernel: ACPI: Reserving FACP table memory at [mem 0x7ffe438d-0x7ffe4480] Oct 29 04:39:10.166818 kernel: ACPI: Reserving DSDT table memory at [mem 0x7ffdfd80-0x7ffe438c] Oct 29 04:39:10.166829 kernel: ACPI: Reserving FACS table memory at [mem 0x7ffdfd40-0x7ffdfd7f] Oct 29 04:39:10.166839 kernel: ACPI: Reserving APIC table memory at [mem 0x7ffe4481-0x7ffe4570] Oct 29 04:39:10.166856 kernel: ACPI: Reserving SRAT table memory at [mem 0x7ffe4571-0x7ffe4740] Oct 29 04:39:10.166871 kernel: ACPI: Reserving MCFG table memory at [mem 0x7ffe4741-0x7ffe477c] Oct 29 04:39:10.166882 kernel: ACPI: Reserving WAET table memory at [mem 0x7ffe477d-0x7ffe47a4] Oct 29 04:39:10.166894 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Oct 29 04:39:10.166905 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Oct 29 04:39:10.166916 kernel: SRAT: PXM 0 -> APIC 0x02 -> Node 0 Oct 29 04:39:10.166927 kernel: SRAT: PXM 0 -> APIC 0x03 -> Node 0 Oct 29 04:39:10.166938 kernel: SRAT: PXM 0 -> APIC 0x04 -> Node 0 Oct 29 04:39:10.166952 kernel: SRAT: PXM 0 -> APIC 0x05 -> Node 0 Oct 29 04:39:10.166963 kernel: SRAT: PXM 0 -> APIC 0x06 -> Node 0 Oct 29 04:39:10.166974 kernel: SRAT: PXM 0 -> APIC 0x07 -> Node 0 Oct 29 04:39:10.166985 kernel: SRAT: PXM 0 -> APIC 0x08 -> Node 0 Oct 29 04:39:10.166997 kernel: SRAT: PXM 0 -> APIC 0x09 -> Node 0 Oct 29 04:39:10.167007 kernel: SRAT: PXM 0 -> APIC 0x0a -> Node 0 Oct 29 04:39:10.167018 kernel: SRAT: PXM 0 -> APIC 0x0b -> Node 0 Oct 29 04:39:10.167029 kernel: SRAT: PXM 0 -> APIC 0x0c -> Node 0 Oct 29 04:39:10.167040 kernel: SRAT: PXM 0 -> APIC 0x0d -> Node 0 Oct 29 04:39:10.167051 kernel: SRAT: PXM 0 -> APIC 0x0e -> Node 0 Oct 29 04:39:10.167066 kernel: SRAT: PXM 0 -> APIC 0x0f -> Node 0 Oct 29 04:39:10.167083 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x0009ffff] Oct 29 04:39:10.167095 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00100000-0x7fffffff] Oct 29 04:39:10.167106 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000-0x20800fffff] hotplug Oct 29 04:39:10.167117 kernel: NUMA: Node 0 [mem 0x00000000-0x0009ffff] + [mem 0x00100000-0x7ffdbfff] -> [mem 0x00000000-0x7ffdbfff] Oct 29 04:39:10.167129 kernel: NODE_DATA(0) allocated [mem 0x7ffd6000-0x7ffdbfff] Oct 29 04:39:10.167140 kernel: Zone ranges: Oct 29 04:39:10.167155 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Oct 29 04:39:10.167167 kernel: DMA32 [mem 0x0000000001000000-0x000000007ffdbfff] Oct 29 04:39:10.167183 kernel: Normal empty Oct 29 04:39:10.167194 kernel: Movable zone start for each node Oct 29 04:39:10.167205 kernel: Early memory node ranges Oct 29 04:39:10.167216 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Oct 29 04:39:10.167228 kernel: node 0: [mem 0x0000000000100000-0x000000007ffdbfff] Oct 29 04:39:10.167239 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007ffdbfff] Oct 29 04:39:10.167250 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Oct 29 04:39:10.167261 kernel: On node 0, zone DMA: 97 pages in unavailable ranges Oct 29 04:39:10.167272 kernel: On node 0, zone DMA32: 36 pages in unavailable ranges Oct 29 04:39:10.167286 kernel: ACPI: PM-Timer IO Port: 0x608 Oct 29 04:39:10.167298 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Oct 29 04:39:10.167309 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Oct 29 04:39:10.167320 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Oct 29 04:39:10.167331 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Oct 29 04:39:10.167342 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Oct 29 04:39:10.167353 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Oct 29 04:39:10.167364 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Oct 29 04:39:10.167375 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Oct 29 04:39:10.167390 kernel: TSC deadline timer available Oct 29 04:39:10.167401 kernel: smpboot: Allowing 16 CPUs, 14 hotplug CPUs Oct 29 04:39:10.167412 kernel: [mem 0xc0000000-0xfed1bfff] available for PCI devices Oct 29 04:39:10.167423 kernel: Booting paravirtualized kernel on KVM Oct 29 04:39:10.167434 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Oct 29 04:39:10.167445 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:16 nr_node_ids:1 Oct 29 04:39:10.167456 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u262144 Oct 29 04:39:10.167467 kernel: pcpu-alloc: s188696 r8192 d32488 u262144 alloc=1*2097152 Oct 29 04:39:10.167478 kernel: pcpu-alloc: [0] 00 01 02 03 04 05 06 07 [0] 08 09 10 11 12 13 14 15 Oct 29 04:39:10.167493 kernel: kvm-guest: stealtime: cpu 0, msr 7da1c0c0 Oct 29 04:39:10.167504 kernel: kvm-guest: PV spinlocks enabled Oct 29 04:39:10.167515 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Oct 29 04:39:10.167526 kernel: Built 1 zonelists, mobility grouping on. Total pages: 515804 Oct 29 04:39:10.167537 kernel: Policy zone: DMA32 Oct 29 04:39:10.167549 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=201610a31b2ff0ec76573eccf3918f182ba51086e5a85b3aea8675643c4efef7 Oct 29 04:39:10.167561 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Oct 29 04:39:10.167572 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Oct 29 04:39:10.167588 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) Oct 29 04:39:10.167619 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Oct 29 04:39:10.167633 kernel: Memory: 1903832K/2096616K available (12295K kernel code, 2276K rwdata, 13732K rodata, 47496K init, 4084K bss, 192524K reserved, 0K cma-reserved) Oct 29 04:39:10.167644 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=16, Nodes=1 Oct 29 04:39:10.167655 kernel: Kernel/User page tables isolation: enabled Oct 29 04:39:10.167666 kernel: ftrace: allocating 34614 entries in 136 pages Oct 29 04:39:10.167678 kernel: ftrace: allocated 136 pages with 2 groups Oct 29 04:39:10.167689 kernel: rcu: Hierarchical RCU implementation. Oct 29 04:39:10.167701 kernel: rcu: RCU event tracing is enabled. Oct 29 04:39:10.167733 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=16. Oct 29 04:39:10.167746 kernel: Rude variant of Tasks RCU enabled. Oct 29 04:39:10.167762 kernel: Tracing variant of Tasks RCU enabled. Oct 29 04:39:10.167774 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Oct 29 04:39:10.167808 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=16 Oct 29 04:39:10.167821 kernel: NR_IRQS: 33024, nr_irqs: 552, preallocated irqs: 16 Oct 29 04:39:10.167833 kernel: random: crng init done Oct 29 04:39:10.167858 kernel: Console: colour VGA+ 80x25 Oct 29 04:39:10.167870 kernel: printk: console [tty0] enabled Oct 29 04:39:10.167882 kernel: printk: console [ttyS0] enabled Oct 29 04:39:10.167894 kernel: ACPI: Core revision 20210730 Oct 29 04:39:10.167905 kernel: APIC: Switch to symmetric I/O mode setup Oct 29 04:39:10.167920 kernel: x2apic enabled Oct 29 04:39:10.167932 kernel: Switched APIC routing to physical x2apic. Oct 29 04:39:10.167944 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x285c3ee517e, max_idle_ns: 440795257231 ns Oct 29 04:39:10.167956 kernel: Calibrating delay loop (skipped) preset value.. 5599.99 BogoMIPS (lpj=2799998) Oct 29 04:39:10.167968 kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated Oct 29 04:39:10.167984 kernel: Last level iTLB entries: 4KB 0, 2MB 0, 4MB 0 Oct 29 04:39:10.167995 kernel: Last level dTLB entries: 4KB 0, 2MB 0, 4MB 0, 1GB 0 Oct 29 04:39:10.168007 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Oct 29 04:39:10.168018 kernel: Spectre V2 : Mitigation: Retpolines Oct 29 04:39:10.168030 kernel: Spectre V2 : Spectre v2 / SpectreRSB: Filling RSB on context switch and VMEXIT Oct 29 04:39:10.168041 kernel: Spectre V2 : Enabling Restricted Speculation for firmware calls Oct 29 04:39:10.168053 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Oct 29 04:39:10.168065 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Oct 29 04:39:10.168076 kernel: MDS: Mitigation: Clear CPU buffers Oct 29 04:39:10.168087 kernel: MMIO Stale Data: Unknown: No mitigations Oct 29 04:39:10.168099 kernel: SRBDS: Unknown: Dependent on hypervisor status Oct 29 04:39:10.168114 kernel: active return thunk: its_return_thunk Oct 29 04:39:10.168126 kernel: ITS: Mitigation: Aligned branch/return thunks Oct 29 04:39:10.168138 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Oct 29 04:39:10.168149 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Oct 29 04:39:10.168161 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Oct 29 04:39:10.168172 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Oct 29 04:39:10.168184 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. Oct 29 04:39:10.168195 kernel: Freeing SMP alternatives memory: 32K Oct 29 04:39:10.168206 kernel: pid_max: default: 32768 minimum: 301 Oct 29 04:39:10.168218 kernel: LSM: Security Framework initializing Oct 29 04:39:10.168229 kernel: SELinux: Initializing. Oct 29 04:39:10.168245 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Oct 29 04:39:10.168257 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Oct 29 04:39:10.168268 kernel: smpboot: CPU0: Intel Xeon E3-12xx v2 (Ivy Bridge, IBRS) (family: 0x6, model: 0x3a, stepping: 0x9) Oct 29 04:39:10.168280 kernel: Performance Events: unsupported p6 CPU model 58 no PMU driver, software events only. Oct 29 04:39:10.168291 kernel: signal: max sigframe size: 1776 Oct 29 04:39:10.168303 kernel: rcu: Hierarchical SRCU implementation. Oct 29 04:39:10.168315 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Oct 29 04:39:10.168326 kernel: smp: Bringing up secondary CPUs ... Oct 29 04:39:10.168343 kernel: x86: Booting SMP configuration: Oct 29 04:39:10.168356 kernel: .... node #0, CPUs: #1 Oct 29 04:39:10.168372 kernel: kvm-clock: cpu 1, msr 5c1a0041, secondary cpu clock Oct 29 04:39:10.168384 kernel: smpboot: CPU 1 Converting physical 0 to logical die 1 Oct 29 04:39:10.168395 kernel: kvm-guest: stealtime: cpu 1, msr 7da5c0c0 Oct 29 04:39:10.168407 kernel: smp: Brought up 1 node, 2 CPUs Oct 29 04:39:10.168419 kernel: smpboot: Max logical packages: 16 Oct 29 04:39:10.168430 kernel: smpboot: Total of 2 processors activated (11199.99 BogoMIPS) Oct 29 04:39:10.168442 kernel: devtmpfs: initialized Oct 29 04:39:10.168454 kernel: x86/mm: Memory block size: 128MB Oct 29 04:39:10.168465 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Oct 29 04:39:10.168481 kernel: futex hash table entries: 4096 (order: 6, 262144 bytes, linear) Oct 29 04:39:10.168533 kernel: pinctrl core: initialized pinctrl subsystem Oct 29 04:39:10.168546 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Oct 29 04:39:10.168558 kernel: audit: initializing netlink subsys (disabled) Oct 29 04:39:10.168570 kernel: audit: type=2000 audit(1761712748.239:1): state=initialized audit_enabled=0 res=1 Oct 29 04:39:10.168581 kernel: thermal_sys: Registered thermal governor 'step_wise' Oct 29 04:39:10.168593 kernel: thermal_sys: Registered thermal governor 'user_space' Oct 29 04:39:10.168615 kernel: cpuidle: using governor menu Oct 29 04:39:10.168628 kernel: ACPI: bus type PCI registered Oct 29 04:39:10.168645 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Oct 29 04:39:10.168657 kernel: dca service started, version 1.12.1 Oct 29 04:39:10.168669 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xb0000000-0xbfffffff] (base 0xb0000000) Oct 29 04:39:10.168681 kernel: PCI: MMCONFIG at [mem 0xb0000000-0xbfffffff] reserved in E820 Oct 29 04:39:10.168693 kernel: PCI: Using configuration type 1 for base access Oct 29 04:39:10.168704 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Oct 29 04:39:10.168716 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Oct 29 04:39:10.168728 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Oct 29 04:39:10.168739 kernel: ACPI: Added _OSI(Module Device) Oct 29 04:39:10.168755 kernel: ACPI: Added _OSI(Processor Device) Oct 29 04:39:10.168767 kernel: ACPI: Added _OSI(Processor Aggregator Device) Oct 29 04:39:10.168778 kernel: ACPI: Added _OSI(Linux-Dell-Video) Oct 29 04:39:10.168790 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Oct 29 04:39:10.168823 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Oct 29 04:39:10.168836 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Oct 29 04:39:10.168848 kernel: ACPI: Interpreter enabled Oct 29 04:39:10.168859 kernel: ACPI: PM: (supports S0 S5) Oct 29 04:39:10.168871 kernel: ACPI: Using IOAPIC for interrupt routing Oct 29 04:39:10.168888 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Oct 29 04:39:10.168899 kernel: ACPI: Enabled 2 GPEs in block 00 to 3F Oct 29 04:39:10.168911 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Oct 29 04:39:10.169183 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Oct 29 04:39:10.169338 kernel: acpi PNP0A08:00: _OSC: platform does not support [LTR] Oct 29 04:39:10.169500 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME AER PCIeCapability] Oct 29 04:39:10.169518 kernel: PCI host bridge to bus 0000:00 Oct 29 04:39:10.169699 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Oct 29 04:39:10.169865 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Oct 29 04:39:10.170002 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Oct 29 04:39:10.170136 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xafffffff window] Oct 29 04:39:10.170271 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] Oct 29 04:39:10.170406 kernel: pci_bus 0000:00: root bus resource [mem 0x20c0000000-0x28bfffffff window] Oct 29 04:39:10.170540 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Oct 29 04:39:10.170749 kernel: pci 0000:00:00.0: [8086:29c0] type 00 class 0x060000 Oct 29 04:39:10.170939 kernel: pci 0000:00:01.0: [1013:00b8] type 00 class 0x030000 Oct 29 04:39:10.171093 kernel: pci 0000:00:01.0: reg 0x10: [mem 0xfa000000-0xfbffffff pref] Oct 29 04:39:10.171247 kernel: pci 0000:00:01.0: reg 0x14: [mem 0xfea50000-0xfea50fff] Oct 29 04:39:10.171397 kernel: pci 0000:00:01.0: reg 0x30: [mem 0xfea40000-0xfea4ffff pref] Oct 29 04:39:10.171549 kernel: pci 0000:00:01.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Oct 29 04:39:10.171776 kernel: pci 0000:00:02.0: [1b36:000c] type 01 class 0x060400 Oct 29 04:39:10.171947 kernel: pci 0000:00:02.0: reg 0x10: [mem 0xfea51000-0xfea51fff] Oct 29 04:39:10.172119 kernel: pci 0000:00:02.1: [1b36:000c] type 01 class 0x060400 Oct 29 04:39:10.172282 kernel: pci 0000:00:02.1: reg 0x10: [mem 0xfea52000-0xfea52fff] Oct 29 04:39:10.178771 kernel: pci 0000:00:02.2: [1b36:000c] type 01 class 0x060400 Oct 29 04:39:10.178948 kernel: pci 0000:00:02.2: reg 0x10: [mem 0xfea53000-0xfea53fff] Oct 29 04:39:10.181254 kernel: pci 0000:00:02.3: [1b36:000c] type 01 class 0x060400 Oct 29 04:39:10.181427 kernel: pci 0000:00:02.3: reg 0x10: [mem 0xfea54000-0xfea54fff] Oct 29 04:39:10.181594 kernel: pci 0000:00:02.4: [1b36:000c] type 01 class 0x060400 Oct 29 04:39:10.181818 kernel: pci 0000:00:02.4: reg 0x10: [mem 0xfea55000-0xfea55fff] Oct 29 04:39:10.181991 kernel: pci 0000:00:02.5: [1b36:000c] type 01 class 0x060400 Oct 29 04:39:10.182145 kernel: pci 0000:00:02.5: reg 0x10: [mem 0xfea56000-0xfea56fff] Oct 29 04:39:10.182306 kernel: pci 0000:00:02.6: [1b36:000c] type 01 class 0x060400 Oct 29 04:39:10.182463 kernel: pci 0000:00:02.6: reg 0x10: [mem 0xfea57000-0xfea57fff] Oct 29 04:39:10.182643 kernel: pci 0000:00:02.7: [1b36:000c] type 01 class 0x060400 Oct 29 04:39:10.182805 kernel: pci 0000:00:02.7: reg 0x10: [mem 0xfea58000-0xfea58fff] Oct 29 04:39:10.182971 kernel: pci 0000:00:03.0: [1af4:1000] type 00 class 0x020000 Oct 29 04:39:10.183121 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc0c0-0xc0df] Oct 29 04:39:10.183269 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xfea59000-0xfea59fff] Oct 29 04:39:10.183426 kernel: pci 0000:00:03.0: reg 0x20: [mem 0xfd000000-0xfd003fff 64bit pref] Oct 29 04:39:10.183574 kernel: pci 0000:00:03.0: reg 0x30: [mem 0xfea00000-0xfea3ffff pref] Oct 29 04:39:10.183751 kernel: pci 0000:00:04.0: [1af4:1001] type 00 class 0x010000 Oct 29 04:39:10.183913 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc000-0xc07f] Oct 29 04:39:10.184061 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xfea5a000-0xfea5afff] Oct 29 04:39:10.184210 kernel: pci 0000:00:04.0: reg 0x20: [mem 0xfd004000-0xfd007fff 64bit pref] Oct 29 04:39:10.184398 kernel: pci 0000:00:1f.0: [8086:2918] type 00 class 0x060100 Oct 29 04:39:10.184557 kernel: pci 0000:00:1f.0: quirk: [io 0x0600-0x067f] claimed by ICH6 ACPI/GPIO/TCO Oct 29 04:39:10.184739 kernel: pci 0000:00:1f.2: [8086:2922] type 00 class 0x010601 Oct 29 04:39:10.184902 kernel: pci 0000:00:1f.2: reg 0x20: [io 0xc0e0-0xc0ff] Oct 29 04:39:10.185050 kernel: pci 0000:00:1f.2: reg 0x24: [mem 0xfea5b000-0xfea5bfff] Oct 29 04:39:10.185222 kernel: pci 0000:00:1f.3: [8086:2930] type 00 class 0x0c0500 Oct 29 04:39:10.185372 kernel: pci 0000:00:1f.3: reg 0x20: [io 0x0700-0x073f] Oct 29 04:39:10.185537 kernel: pci 0000:01:00.0: [1b36:000e] type 01 class 0x060400 Oct 29 04:39:10.193821 kernel: pci 0000:01:00.0: reg 0x10: [mem 0xfda00000-0xfda000ff 64bit] Oct 29 04:39:10.194003 kernel: pci 0000:00:02.0: PCI bridge to [bus 01-02] Oct 29 04:39:10.194156 kernel: pci 0000:00:02.0: bridge window [mem 0xfd800000-0xfdbfffff] Oct 29 04:39:10.194306 kernel: pci 0000:00:02.0: bridge window [mem 0xfce00000-0xfcffffff 64bit pref] Oct 29 04:39:10.194478 kernel: pci_bus 0000:02: extended config space not accessible Oct 29 04:39:10.194684 kernel: pci 0000:02:01.0: [8086:25ab] type 00 class 0x088000 Oct 29 04:39:10.194873 kernel: pci 0000:02:01.0: reg 0x10: [mem 0xfd800000-0xfd80000f] Oct 29 04:39:10.195032 kernel: pci 0000:01:00.0: PCI bridge to [bus 02] Oct 29 04:39:10.195187 kernel: pci 0000:01:00.0: bridge window [mem 0xfd800000-0xfd9fffff] Oct 29 04:39:10.195403 kernel: pci 0000:03:00.0: [1b36:000d] type 00 class 0x0c0330 Oct 29 04:39:10.195563 kernel: pci 0000:03:00.0: reg 0x10: [mem 0xfe800000-0xfe803fff 64bit] Oct 29 04:39:10.195768 kernel: pci 0000:00:02.1: PCI bridge to [bus 03] Oct 29 04:39:10.195940 kernel: pci 0000:00:02.1: bridge window [mem 0xfe800000-0xfe9fffff] Oct 29 04:39:10.196093 kernel: pci 0000:00:02.1: bridge window [mem 0xfcc00000-0xfcdfffff 64bit pref] Oct 29 04:39:10.196294 kernel: pci 0000:04:00.0: [1af4:1044] type 00 class 0x00ff00 Oct 29 04:39:10.196455 kernel: pci 0000:04:00.0: reg 0x20: [mem 0xfca00000-0xfca03fff 64bit pref] Oct 29 04:39:10.196625 kernel: pci 0000:00:02.2: PCI bridge to [bus 04] Oct 29 04:39:10.196778 kernel: pci 0000:00:02.2: bridge window [mem 0xfe600000-0xfe7fffff] Oct 29 04:39:10.196942 kernel: pci 0000:00:02.2: bridge window [mem 0xfca00000-0xfcbfffff 64bit pref] Oct 29 04:39:10.197098 kernel: pci 0000:00:02.3: PCI bridge to [bus 05] Oct 29 04:39:10.197259 kernel: pci 0000:00:02.3: bridge window [mem 0xfe400000-0xfe5fffff] Oct 29 04:39:10.197410 kernel: pci 0000:00:02.3: bridge window [mem 0xfc800000-0xfc9fffff 64bit pref] Oct 29 04:39:10.197577 kernel: pci 0000:00:02.4: PCI bridge to [bus 06] Oct 29 04:39:10.197743 kernel: pci 0000:00:02.4: bridge window [mem 0xfe200000-0xfe3fffff] Oct 29 04:39:10.197931 kernel: pci 0000:00:02.4: bridge window [mem 0xfc600000-0xfc7fffff 64bit pref] Oct 29 04:39:10.198092 kernel: pci 0000:00:02.5: PCI bridge to [bus 07] Oct 29 04:39:10.198279 kernel: pci 0000:00:02.5: bridge window [mem 0xfe000000-0xfe1fffff] Oct 29 04:39:10.198432 kernel: pci 0000:00:02.5: bridge window [mem 0xfc400000-0xfc5fffff 64bit pref] Oct 29 04:39:10.198615 kernel: pci 0000:00:02.6: PCI bridge to [bus 08] Oct 29 04:39:10.198774 kernel: pci 0000:00:02.6: bridge window [mem 0xfde00000-0xfdffffff] Oct 29 04:39:10.198935 kernel: pci 0000:00:02.6: bridge window [mem 0xfc200000-0xfc3fffff 64bit pref] Oct 29 04:39:10.199128 kernel: pci 0000:00:02.7: PCI bridge to [bus 09] Oct 29 04:39:10.199283 kernel: pci 0000:00:02.7: bridge window [mem 0xfdc00000-0xfddfffff] Oct 29 04:39:10.199433 kernel: pci 0000:00:02.7: bridge window [mem 0xfc000000-0xfc1fffff 64bit pref] Oct 29 04:39:10.199451 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Oct 29 04:39:10.199464 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Oct 29 04:39:10.199483 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Oct 29 04:39:10.199495 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Oct 29 04:39:10.199507 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 10 Oct 29 04:39:10.199520 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 10 Oct 29 04:39:10.199532 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 11 Oct 29 04:39:10.199544 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 11 Oct 29 04:39:10.199556 kernel: ACPI: PCI: Interrupt link GSIA configured for IRQ 16 Oct 29 04:39:10.199568 kernel: ACPI: PCI: Interrupt link GSIB configured for IRQ 17 Oct 29 04:39:10.199580 kernel: ACPI: PCI: Interrupt link GSIC configured for IRQ 18 Oct 29 04:39:10.199597 kernel: ACPI: PCI: Interrupt link GSID configured for IRQ 19 Oct 29 04:39:10.199627 kernel: ACPI: PCI: Interrupt link GSIE configured for IRQ 20 Oct 29 04:39:10.199639 kernel: ACPI: PCI: Interrupt link GSIF configured for IRQ 21 Oct 29 04:39:10.199652 kernel: ACPI: PCI: Interrupt link GSIG configured for IRQ 22 Oct 29 04:39:10.199663 kernel: ACPI: PCI: Interrupt link GSIH configured for IRQ 23 Oct 29 04:39:10.199675 kernel: iommu: Default domain type: Translated Oct 29 04:39:10.199687 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Oct 29 04:39:10.199856 kernel: pci 0000:00:01.0: vgaarb: setting as boot VGA device Oct 29 04:39:10.200011 kernel: pci 0000:00:01.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Oct 29 04:39:10.200170 kernel: pci 0000:00:01.0: vgaarb: bridge control possible Oct 29 04:39:10.200189 kernel: vgaarb: loaded Oct 29 04:39:10.200202 kernel: pps_core: LinuxPPS API ver. 1 registered Oct 29 04:39:10.200214 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Oct 29 04:39:10.200226 kernel: PTP clock support registered Oct 29 04:39:10.200238 kernel: PCI: Using ACPI for IRQ routing Oct 29 04:39:10.200250 kernel: PCI: pci_cache_line_size set to 64 bytes Oct 29 04:39:10.200262 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] Oct 29 04:39:10.200279 kernel: e820: reserve RAM buffer [mem 0x7ffdc000-0x7fffffff] Oct 29 04:39:10.200292 kernel: clocksource: Switched to clocksource kvm-clock Oct 29 04:39:10.200304 kernel: VFS: Disk quotas dquot_6.6.0 Oct 29 04:39:10.200317 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Oct 29 04:39:10.200329 kernel: pnp: PnP ACPI init Oct 29 04:39:10.200506 kernel: system 00:04: [mem 0xb0000000-0xbfffffff window] has been reserved Oct 29 04:39:10.200526 kernel: pnp: PnP ACPI: found 5 devices Oct 29 04:39:10.200539 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Oct 29 04:39:10.200551 kernel: NET: Registered PF_INET protocol family Oct 29 04:39:10.200569 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) Oct 29 04:39:10.200582 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) Oct 29 04:39:10.200594 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Oct 29 04:39:10.208132 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) Oct 29 04:39:10.208148 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear) Oct 29 04:39:10.208161 kernel: TCP: Hash tables configured (established 16384 bind 16384) Oct 29 04:39:10.208173 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) Oct 29 04:39:10.208185 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) Oct 29 04:39:10.208206 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Oct 29 04:39:10.208219 kernel: NET: Registered PF_XDP protocol family Oct 29 04:39:10.208420 kernel: pci 0000:00:02.0: bridge window [io 0x1000-0x0fff] to [bus 01-02] add_size 1000 Oct 29 04:39:10.208581 kernel: pci 0000:00:02.1: bridge window [io 0x1000-0x0fff] to [bus 03] add_size 1000 Oct 29 04:39:10.208758 kernel: pci 0000:00:02.2: bridge window [io 0x1000-0x0fff] to [bus 04] add_size 1000 Oct 29 04:39:10.208929 kernel: pci 0000:00:02.3: bridge window [io 0x1000-0x0fff] to [bus 05] add_size 1000 Oct 29 04:39:10.209082 kernel: pci 0000:00:02.4: bridge window [io 0x1000-0x0fff] to [bus 06] add_size 1000 Oct 29 04:39:10.209257 kernel: pci 0000:00:02.5: bridge window [io 0x1000-0x0fff] to [bus 07] add_size 1000 Oct 29 04:39:10.209430 kernel: pci 0000:00:02.6: bridge window [io 0x1000-0x0fff] to [bus 08] add_size 1000 Oct 29 04:39:10.209581 kernel: pci 0000:00:02.7: bridge window [io 0x1000-0x0fff] to [bus 09] add_size 1000 Oct 29 04:39:10.209752 kernel: pci 0000:00:02.0: BAR 13: assigned [io 0x1000-0x1fff] Oct 29 04:39:10.209928 kernel: pci 0000:00:02.1: BAR 13: assigned [io 0x2000-0x2fff] Oct 29 04:39:10.210078 kernel: pci 0000:00:02.2: BAR 13: assigned [io 0x3000-0x3fff] Oct 29 04:39:10.210226 kernel: pci 0000:00:02.3: BAR 13: assigned [io 0x4000-0x4fff] Oct 29 04:39:10.210381 kernel: pci 0000:00:02.4: BAR 13: assigned [io 0x5000-0x5fff] Oct 29 04:39:10.210531 kernel: pci 0000:00:02.5: BAR 13: assigned [io 0x6000-0x6fff] Oct 29 04:39:10.210717 kernel: pci 0000:00:02.6: BAR 13: assigned [io 0x7000-0x7fff] Oct 29 04:39:10.210920 kernel: pci 0000:00:02.7: BAR 13: assigned [io 0x8000-0x8fff] Oct 29 04:39:10.211085 kernel: pci 0000:01:00.0: PCI bridge to [bus 02] Oct 29 04:39:10.211239 kernel: pci 0000:01:00.0: bridge window [mem 0xfd800000-0xfd9fffff] Oct 29 04:39:10.211503 kernel: pci 0000:00:02.0: PCI bridge to [bus 01-02] Oct 29 04:39:10.211698 kernel: pci 0000:00:02.0: bridge window [io 0x1000-0x1fff] Oct 29 04:39:10.211876 kernel: pci 0000:00:02.0: bridge window [mem 0xfd800000-0xfdbfffff] Oct 29 04:39:10.212033 kernel: pci 0000:00:02.0: bridge window [mem 0xfce00000-0xfcffffff 64bit pref] Oct 29 04:39:10.212207 kernel: pci 0000:00:02.1: PCI bridge to [bus 03] Oct 29 04:39:10.212357 kernel: pci 0000:00:02.1: bridge window [io 0x2000-0x2fff] Oct 29 04:39:10.212507 kernel: pci 0000:00:02.1: bridge window [mem 0xfe800000-0xfe9fffff] Oct 29 04:39:10.212679 kernel: pci 0000:00:02.1: bridge window [mem 0xfcc00000-0xfcdfffff 64bit pref] Oct 29 04:39:10.212893 kernel: pci 0000:00:02.2: PCI bridge to [bus 04] Oct 29 04:39:10.213078 kernel: pci 0000:00:02.2: bridge window [io 0x3000-0x3fff] Oct 29 04:39:10.213242 kernel: pci 0000:00:02.2: bridge window [mem 0xfe600000-0xfe7fffff] Oct 29 04:39:10.213442 kernel: pci 0000:00:02.2: bridge window [mem 0xfca00000-0xfcbfffff 64bit pref] Oct 29 04:39:10.213619 kernel: pci 0000:00:02.3: PCI bridge to [bus 05] Oct 29 04:39:10.213805 kernel: pci 0000:00:02.3: bridge window [io 0x4000-0x4fff] Oct 29 04:39:10.213988 kernel: pci 0000:00:02.3: bridge window [mem 0xfe400000-0xfe5fffff] Oct 29 04:39:10.214170 kernel: pci 0000:00:02.3: bridge window [mem 0xfc800000-0xfc9fffff 64bit pref] Oct 29 04:39:10.214349 kernel: pci 0000:00:02.4: PCI bridge to [bus 06] Oct 29 04:39:10.214529 kernel: pci 0000:00:02.4: bridge window [io 0x5000-0x5fff] Oct 29 04:39:10.214738 kernel: pci 0000:00:02.4: bridge window [mem 0xfe200000-0xfe3fffff] Oct 29 04:39:10.214916 kernel: pci 0000:00:02.4: bridge window [mem 0xfc600000-0xfc7fffff 64bit pref] Oct 29 04:39:10.215084 kernel: pci 0000:00:02.5: PCI bridge to [bus 07] Oct 29 04:39:10.215265 kernel: pci 0000:00:02.5: bridge window [io 0x6000-0x6fff] Oct 29 04:39:10.215420 kernel: pci 0000:00:02.5: bridge window [mem 0xfe000000-0xfe1fffff] Oct 29 04:39:10.215572 kernel: pci 0000:00:02.5: bridge window [mem 0xfc400000-0xfc5fffff 64bit pref] Oct 29 04:39:10.216859 kernel: pci 0000:00:02.6: PCI bridge to [bus 08] Oct 29 04:39:10.217034 kernel: pci 0000:00:02.6: bridge window [io 0x7000-0x7fff] Oct 29 04:39:10.217186 kernel: pci 0000:00:02.6: bridge window [mem 0xfde00000-0xfdffffff] Oct 29 04:39:10.217406 kernel: pci 0000:00:02.6: bridge window [mem 0xfc200000-0xfc3fffff 64bit pref] Oct 29 04:39:10.217572 kernel: pci 0000:00:02.7: PCI bridge to [bus 09] Oct 29 04:39:10.217741 kernel: pci 0000:00:02.7: bridge window [io 0x8000-0x8fff] Oct 29 04:39:10.217959 kernel: pci 0000:00:02.7: bridge window [mem 0xfdc00000-0xfddfffff] Oct 29 04:39:10.218110 kernel: pci 0000:00:02.7: bridge window [mem 0xfc000000-0xfc1fffff 64bit pref] Oct 29 04:39:10.218256 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Oct 29 04:39:10.218426 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Oct 29 04:39:10.218563 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Oct 29 04:39:10.218790 kernel: pci_bus 0000:00: resource 7 [mem 0x80000000-0xafffffff window] Oct 29 04:39:10.218973 kernel: pci_bus 0000:00: resource 8 [mem 0xc0000000-0xfebfffff window] Oct 29 04:39:10.219141 kernel: pci_bus 0000:00: resource 9 [mem 0x20c0000000-0x28bfffffff window] Oct 29 04:39:10.219310 kernel: pci_bus 0000:01: resource 0 [io 0x1000-0x1fff] Oct 29 04:39:10.219461 kernel: pci_bus 0000:01: resource 1 [mem 0xfd800000-0xfdbfffff] Oct 29 04:39:10.219629 kernel: pci_bus 0000:01: resource 2 [mem 0xfce00000-0xfcffffff 64bit pref] Oct 29 04:39:10.219786 kernel: pci_bus 0000:02: resource 1 [mem 0xfd800000-0xfd9fffff] Oct 29 04:39:10.219957 kernel: pci_bus 0000:03: resource 0 [io 0x2000-0x2fff] Oct 29 04:39:10.220102 kernel: pci_bus 0000:03: resource 1 [mem 0xfe800000-0xfe9fffff] Oct 29 04:39:10.220244 kernel: pci_bus 0000:03: resource 2 [mem 0xfcc00000-0xfcdfffff 64bit pref] Oct 29 04:39:10.220409 kernel: pci_bus 0000:04: resource 0 [io 0x3000-0x3fff] Oct 29 04:39:10.220550 kernel: pci_bus 0000:04: resource 1 [mem 0xfe600000-0xfe7fffff] Oct 29 04:39:10.220717 kernel: pci_bus 0000:04: resource 2 [mem 0xfca00000-0xfcbfffff 64bit pref] Oct 29 04:39:10.220888 kernel: pci_bus 0000:05: resource 0 [io 0x4000-0x4fff] Oct 29 04:39:10.221031 kernel: pci_bus 0000:05: resource 1 [mem 0xfe400000-0xfe5fffff] Oct 29 04:39:10.221171 kernel: pci_bus 0000:05: resource 2 [mem 0xfc800000-0xfc9fffff 64bit pref] Oct 29 04:39:10.221388 kernel: pci_bus 0000:06: resource 0 [io 0x5000-0x5fff] Oct 29 04:39:10.221540 kernel: pci_bus 0000:06: resource 1 [mem 0xfe200000-0xfe3fffff] Oct 29 04:39:10.221727 kernel: pci_bus 0000:06: resource 2 [mem 0xfc600000-0xfc7fffff 64bit pref] Oct 29 04:39:10.221899 kernel: pci_bus 0000:07: resource 0 [io 0x6000-0x6fff] Oct 29 04:39:10.222044 kernel: pci_bus 0000:07: resource 1 [mem 0xfe000000-0xfe1fffff] Oct 29 04:39:10.222187 kernel: pci_bus 0000:07: resource 2 [mem 0xfc400000-0xfc5fffff 64bit pref] Oct 29 04:39:10.222341 kernel: pci_bus 0000:08: resource 0 [io 0x7000-0x7fff] Oct 29 04:39:10.222520 kernel: pci_bus 0000:08: resource 1 [mem 0xfde00000-0xfdffffff] Oct 29 04:39:10.222684 kernel: pci_bus 0000:08: resource 2 [mem 0xfc200000-0xfc3fffff 64bit pref] Oct 29 04:39:10.222864 kernel: pci_bus 0000:09: resource 0 [io 0x8000-0x8fff] Oct 29 04:39:10.223008 kernel: pci_bus 0000:09: resource 1 [mem 0xfdc00000-0xfddfffff] Oct 29 04:39:10.223150 kernel: pci_bus 0000:09: resource 2 [mem 0xfc000000-0xfc1fffff 64bit pref] Oct 29 04:39:10.223170 kernel: ACPI: \_SB_.GSIG: Enabled at IRQ 22 Oct 29 04:39:10.223183 kernel: PCI: CLS 0 bytes, default 64 Oct 29 04:39:10.223196 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Oct 29 04:39:10.223216 kernel: software IO TLB: mapped [mem 0x0000000079800000-0x000000007d800000] (64MB) Oct 29 04:39:10.223230 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Oct 29 04:39:10.223242 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x285c3ee517e, max_idle_ns: 440795257231 ns Oct 29 04:39:10.223255 kernel: Initialise system trusted keyrings Oct 29 04:39:10.223268 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0 Oct 29 04:39:10.223280 kernel: Key type asymmetric registered Oct 29 04:39:10.223293 kernel: Asymmetric key parser 'x509' registered Oct 29 04:39:10.223305 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Oct 29 04:39:10.223318 kernel: io scheduler mq-deadline registered Oct 29 04:39:10.223335 kernel: io scheduler kyber registered Oct 29 04:39:10.223348 kernel: io scheduler bfq registered Oct 29 04:39:10.223498 kernel: pcieport 0000:00:02.0: PME: Signaling with IRQ 24 Oct 29 04:39:10.232940 kernel: pcieport 0000:00:02.0: AER: enabled with IRQ 24 Oct 29 04:39:10.233127 kernel: pcieport 0000:00:02.0: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Oct 29 04:39:10.233287 kernel: pcieport 0000:00:02.1: PME: Signaling with IRQ 25 Oct 29 04:39:10.233440 kernel: pcieport 0000:00:02.1: AER: enabled with IRQ 25 Oct 29 04:39:10.233615 kernel: pcieport 0000:00:02.1: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Oct 29 04:39:10.233774 kernel: pcieport 0000:00:02.2: PME: Signaling with IRQ 26 Oct 29 04:39:10.233940 kernel: pcieport 0000:00:02.2: AER: enabled with IRQ 26 Oct 29 04:39:10.234093 kernel: pcieport 0000:00:02.2: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Oct 29 04:39:10.234247 kernel: pcieport 0000:00:02.3: PME: Signaling with IRQ 27 Oct 29 04:39:10.234396 kernel: pcieport 0000:00:02.3: AER: enabled with IRQ 27 Oct 29 04:39:10.234552 kernel: pcieport 0000:00:02.3: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Oct 29 04:39:10.234721 kernel: pcieport 0000:00:02.4: PME: Signaling with IRQ 28 Oct 29 04:39:10.234884 kernel: pcieport 0000:00:02.4: AER: enabled with IRQ 28 Oct 29 04:39:10.235035 kernel: pcieport 0000:00:02.4: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Oct 29 04:39:10.235189 kernel: pcieport 0000:00:02.5: PME: Signaling with IRQ 29 Oct 29 04:39:10.235340 kernel: pcieport 0000:00:02.5: AER: enabled with IRQ 29 Oct 29 04:39:10.235511 kernel: pcieport 0000:00:02.5: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Oct 29 04:39:10.235683 kernel: pcieport 0000:00:02.6: PME: Signaling with IRQ 30 Oct 29 04:39:10.235850 kernel: pcieport 0000:00:02.6: AER: enabled with IRQ 30 Oct 29 04:39:10.236001 kernel: pcieport 0000:00:02.6: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Oct 29 04:39:10.236155 kernel: pcieport 0000:00:02.7: PME: Signaling with IRQ 31 Oct 29 04:39:10.236306 kernel: pcieport 0000:00:02.7: AER: enabled with IRQ 31 Oct 29 04:39:10.236464 kernel: pcieport 0000:00:02.7: pciehp: Slot #0 AttnBtn+ PwrCtrl+ MRL- AttnInd+ PwrInd+ HotPlug+ Surprise+ Interlock+ NoCompl- IbPresDis- LLActRep+ Oct 29 04:39:10.236484 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Oct 29 04:39:10.236499 kernel: ACPI: \_SB_.GSIH: Enabled at IRQ 23 Oct 29 04:39:10.236512 kernel: ACPI: \_SB_.GSIE: Enabled at IRQ 20 Oct 29 04:39:10.236525 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Oct 29 04:39:10.236538 kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Oct 29 04:39:10.236551 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Oct 29 04:39:10.236570 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Oct 29 04:39:10.236587 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Oct 29 04:39:10.236611 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Oct 29 04:39:10.236812 kernel: rtc_cmos 00:03: RTC can wake from S4 Oct 29 04:39:10.236983 kernel: rtc_cmos 00:03: registered as rtc0 Oct 29 04:39:10.237151 kernel: rtc_cmos 00:03: setting system clock to 2025-10-29T04:39:09 UTC (1761712749) Oct 29 04:39:10.237327 kernel: rtc_cmos 00:03: alarms up to one day, y3k, 242 bytes nvram Oct 29 04:39:10.237346 kernel: intel_pstate: CPU model not supported Oct 29 04:39:10.237359 kernel: NET: Registered PF_INET6 protocol family Oct 29 04:39:10.237379 kernel: Segment Routing with IPv6 Oct 29 04:39:10.237392 kernel: In-situ OAM (IOAM) with IPv6 Oct 29 04:39:10.237405 kernel: NET: Registered PF_PACKET protocol family Oct 29 04:39:10.237417 kernel: Key type dns_resolver registered Oct 29 04:39:10.237430 kernel: IPI shorthand broadcast: enabled Oct 29 04:39:10.237443 kernel: sched_clock: Marking stable (957588132, 207305967)->(1437136729, -272242630) Oct 29 04:39:10.237456 kernel: registered taskstats version 1 Oct 29 04:39:10.237468 kernel: Loading compiled-in X.509 certificates Oct 29 04:39:10.237482 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.192-flatcar: 88bc8a4d729b2f514b4a44a35b666d3248ded14a' Oct 29 04:39:10.237498 kernel: Key type .fscrypt registered Oct 29 04:39:10.237510 kernel: Key type fscrypt-provisioning registered Oct 29 04:39:10.237523 kernel: ima: No TPM chip found, activating TPM-bypass! Oct 29 04:39:10.237535 kernel: ima: Allocated hash algorithm: sha1 Oct 29 04:39:10.237548 kernel: ima: No architecture policies found Oct 29 04:39:10.237560 kernel: clk: Disabling unused clocks Oct 29 04:39:10.237573 kernel: Freeing unused kernel image (initmem) memory: 47496K Oct 29 04:39:10.237586 kernel: Write protecting the kernel read-only data: 28672k Oct 29 04:39:10.237623 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Oct 29 04:39:10.237637 kernel: Freeing unused kernel image (rodata/data gap) memory: 604K Oct 29 04:39:10.237650 kernel: Run /init as init process Oct 29 04:39:10.237663 kernel: with arguments: Oct 29 04:39:10.237675 kernel: /init Oct 29 04:39:10.237688 kernel: with environment: Oct 29 04:39:10.237700 kernel: HOME=/ Oct 29 04:39:10.237712 kernel: TERM=linux Oct 29 04:39:10.237725 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Oct 29 04:39:10.237742 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Oct 29 04:39:10.237763 systemd[1]: Detected virtualization kvm. Oct 29 04:39:10.237776 systemd[1]: Detected architecture x86-64. Oct 29 04:39:10.237790 systemd[1]: Running in initrd. Oct 29 04:39:10.237814 systemd[1]: No hostname configured, using default hostname. Oct 29 04:39:10.237827 systemd[1]: Hostname set to . Oct 29 04:39:10.237840 systemd[1]: Initializing machine ID from VM UUID. Oct 29 04:39:10.237853 systemd[1]: Queued start job for default target initrd.target. Oct 29 04:39:10.237871 systemd[1]: Started systemd-ask-password-console.path. Oct 29 04:39:10.237884 systemd[1]: Reached target cryptsetup.target. Oct 29 04:39:10.237897 systemd[1]: Reached target paths.target. Oct 29 04:39:10.237910 systemd[1]: Reached target slices.target. Oct 29 04:39:10.237923 systemd[1]: Reached target swap.target. Oct 29 04:39:10.237935 systemd[1]: Reached target timers.target. Oct 29 04:39:10.237949 systemd[1]: Listening on iscsid.socket. Oct 29 04:39:10.237966 systemd[1]: Listening on iscsiuio.socket. Oct 29 04:39:10.237980 systemd[1]: Listening on systemd-journald-audit.socket. Oct 29 04:39:10.237993 systemd[1]: Listening on systemd-journald-dev-log.socket. Oct 29 04:39:10.238007 systemd[1]: Listening on systemd-journald.socket. Oct 29 04:39:10.238020 systemd[1]: Listening on systemd-networkd.socket. Oct 29 04:39:10.238033 systemd[1]: Listening on systemd-udevd-control.socket. Oct 29 04:39:10.238047 systemd[1]: Listening on systemd-udevd-kernel.socket. Oct 29 04:39:10.238072 systemd[1]: Reached target sockets.target. Oct 29 04:39:10.238085 systemd[1]: Starting kmod-static-nodes.service... Oct 29 04:39:10.238102 systemd[1]: Finished network-cleanup.service. Oct 29 04:39:10.238115 systemd[1]: Starting systemd-fsck-usr.service... Oct 29 04:39:10.238140 systemd[1]: Starting systemd-journald.service... Oct 29 04:39:10.238157 systemd[1]: Starting systemd-modules-load.service... Oct 29 04:39:10.238170 systemd[1]: Starting systemd-resolved.service... Oct 29 04:39:10.238183 systemd[1]: Starting systemd-vconsole-setup.service... Oct 29 04:39:10.238196 systemd[1]: Finished kmod-static-nodes.service. Oct 29 04:39:10.238209 systemd[1]: Finished systemd-fsck-usr.service. Oct 29 04:39:10.238226 kernel: audit: type=1130 audit(1761712750.167:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:10.238244 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Oct 29 04:39:10.238278 systemd-journald[202]: Journal started Oct 29 04:39:10.238374 systemd-journald[202]: Runtime Journal (/run/log/journal/cc479577199b479fb28b6f677da4d739) is 4.7M, max 38.1M, 33.3M free. Oct 29 04:39:10.167000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:10.172364 systemd-modules-load[203]: Inserted module 'overlay' Oct 29 04:39:10.284324 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Oct 29 04:39:10.284362 kernel: Bridge firewalling registered Oct 29 04:39:10.284380 kernel: SCSI subsystem initialized Oct 29 04:39:10.284396 systemd[1]: Started systemd-journald.service. Oct 29 04:39:10.238377 systemd-resolved[204]: Positive Trust Anchors: Oct 29 04:39:10.293013 kernel: audit: type=1130 audit(1761712750.284:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:10.293067 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Oct 29 04:39:10.293100 kernel: device-mapper: uevent: version 1.0.3 Oct 29 04:39:10.293119 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Oct 29 04:39:10.284000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:10.238395 systemd-resolved[204]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Oct 29 04:39:10.312571 kernel: audit: type=1130 audit(1761712750.296:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:10.312651 kernel: audit: type=1130 audit(1761712750.301:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:10.312672 kernel: audit: type=1130 audit(1761712750.306:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:10.296000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:10.301000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:10.306000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:10.238447 systemd-resolved[204]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Oct 29 04:39:10.245859 systemd-resolved[204]: Defaulting to hostname 'linux'. Oct 29 04:39:10.251998 systemd-modules-load[203]: Inserted module 'br_netfilter' Oct 29 04:39:10.324810 kernel: audit: type=1130 audit(1761712750.317:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:10.317000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:10.285074 systemd[1]: Started systemd-resolved.service. Oct 29 04:39:10.297055 systemd[1]: Finished systemd-vconsole-setup.service. Oct 29 04:39:10.301931 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Oct 29 04:39:10.307054 systemd[1]: Reached target nss-lookup.target. Oct 29 04:39:10.312381 systemd-modules-load[203]: Inserted module 'dm_multipath' Oct 29 04:39:10.314780 systemd[1]: Starting dracut-cmdline-ask.service... Oct 29 04:39:10.317331 systemd[1]: Finished systemd-modules-load.service. Oct 29 04:39:10.322991 systemd[1]: Starting systemd-sysctl.service... Oct 29 04:39:10.336350 systemd[1]: Finished systemd-sysctl.service. Oct 29 04:39:10.343002 kernel: audit: type=1130 audit(1761712750.336:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:10.336000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:10.348000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:10.348517 systemd[1]: Finished dracut-cmdline-ask.service. Oct 29 04:39:10.367130 kernel: audit: type=1130 audit(1761712750.348:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:10.367729 systemd[1]: Starting dracut-cmdline.service... Oct 29 04:39:10.380319 dracut-cmdline[225]: dracut-dracut-053 Oct 29 04:39:10.383777 dracut-cmdline[225]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=201610a31b2ff0ec76573eccf3918f182ba51086e5a85b3aea8675643c4efef7 Oct 29 04:39:10.467643 kernel: Loading iSCSI transport class v2.0-870. Oct 29 04:39:10.488642 kernel: iscsi: registered transport (tcp) Oct 29 04:39:10.516972 kernel: iscsi: registered transport (qla4xxx) Oct 29 04:39:10.517082 kernel: QLogic iSCSI HBA Driver Oct 29 04:39:10.565706 systemd[1]: Finished dracut-cmdline.service. Oct 29 04:39:10.566000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:10.568408 systemd[1]: Starting dracut-pre-udev.service... Oct 29 04:39:10.573769 kernel: audit: type=1130 audit(1761712750.566:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:10.627694 kernel: raid6: sse2x4 gen() 13722 MB/s Oct 29 04:39:10.645730 kernel: raid6: sse2x4 xor() 8032 MB/s Oct 29 04:39:10.663642 kernel: raid6: sse2x2 gen() 9672 MB/s Oct 29 04:39:10.681656 kernel: raid6: sse2x2 xor() 8204 MB/s Oct 29 04:39:10.699651 kernel: raid6: sse2x1 gen() 9845 MB/s Oct 29 04:39:10.718289 kernel: raid6: sse2x1 xor() 7423 MB/s Oct 29 04:39:10.718375 kernel: raid6: using algorithm sse2x4 gen() 13722 MB/s Oct 29 04:39:10.718400 kernel: raid6: .... xor() 8032 MB/s, rmw enabled Oct 29 04:39:10.719522 kernel: raid6: using ssse3x2 recovery algorithm Oct 29 04:39:10.736640 kernel: xor: automatically using best checksumming function avx Oct 29 04:39:10.851659 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Oct 29 04:39:10.865045 systemd[1]: Finished dracut-pre-udev.service. Oct 29 04:39:10.865000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:10.865000 audit: BPF prog-id=7 op=LOAD Oct 29 04:39:10.865000 audit: BPF prog-id=8 op=LOAD Oct 29 04:39:10.867156 systemd[1]: Starting systemd-udevd.service... Oct 29 04:39:10.884847 systemd-udevd[403]: Using default interface naming scheme 'v252'. Oct 29 04:39:10.892000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:10.892909 systemd[1]: Started systemd-udevd.service. Oct 29 04:39:10.902799 systemd[1]: Starting dracut-pre-trigger.service... Oct 29 04:39:10.915977 dracut-pre-trigger[408]: rd.md=0: removing MD RAID activation Oct 29 04:39:10.960011 systemd[1]: Finished dracut-pre-trigger.service. Oct 29 04:39:10.961000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:10.965009 systemd[1]: Starting systemd-udev-trigger.service... Oct 29 04:39:11.065461 systemd[1]: Finished systemd-udev-trigger.service. Oct 29 04:39:11.066000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:11.153630 kernel: virtio_blk virtio1: [vda] 125829120 512-byte logical blocks (64.4 GB/60.0 GiB) Oct 29 04:39:11.217762 kernel: cryptd: max_cpu_qlen set to 1000 Oct 29 04:39:11.217806 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Oct 29 04:39:11.217832 kernel: GPT:17805311 != 125829119 Oct 29 04:39:11.217858 kernel: GPT:Alternate GPT header not at the end of the disk. Oct 29 04:39:11.217875 kernel: GPT:17805311 != 125829119 Oct 29 04:39:11.217890 kernel: GPT: Use GNU Parted to correct GPT errors. Oct 29 04:39:11.217906 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Oct 29 04:39:11.217921 kernel: AVX version of gcm_enc/dec engaged. Oct 29 04:39:11.217937 kernel: AES CTR mode by8 optimization enabled Oct 29 04:39:11.217952 kernel: ACPI: bus type USB registered Oct 29 04:39:11.222107 kernel: usbcore: registered new interface driver usbfs Oct 29 04:39:11.225656 kernel: usbcore: registered new interface driver hub Oct 29 04:39:11.227634 kernel: usbcore: registered new device driver usb Oct 29 04:39:11.227670 kernel: libata version 3.00 loaded. Oct 29 04:39:11.255657 kernel: BTRFS: device label OEM devid 1 transid 9 /dev/vda6 scanned by (udev-worker) (454) Oct 29 04:39:11.263176 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Oct 29 04:39:11.369162 kernel: ahci 0000:00:1f.2: version 3.0 Oct 29 04:39:11.369661 kernel: ACPI: \_SB_.GSIA: Enabled at IRQ 16 Oct 29 04:39:11.369698 kernel: ahci 0000:00:1f.2: AHCI 0001.0000 32 slots 6 ports 1.5 Gbps 0x3f impl SATA mode Oct 29 04:39:11.369921 kernel: ahci 0000:00:1f.2: flags: 64bit ncq only Oct 29 04:39:11.370102 kernel: scsi host0: ahci Oct 29 04:39:11.370326 kernel: scsi host1: ahci Oct 29 04:39:11.370545 kernel: scsi host2: ahci Oct 29 04:39:11.370810 kernel: scsi host3: ahci Oct 29 04:39:11.371012 kernel: scsi host4: ahci Oct 29 04:39:11.371227 kernel: scsi host5: ahci Oct 29 04:39:11.371465 kernel: ata1: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b100 irq 38 Oct 29 04:39:11.371489 kernel: ata2: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b180 irq 38 Oct 29 04:39:11.371506 kernel: ata3: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b200 irq 38 Oct 29 04:39:11.371522 kernel: ata4: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b280 irq 38 Oct 29 04:39:11.371542 kernel: ata5: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b300 irq 38 Oct 29 04:39:11.371564 kernel: ata6: SATA max UDMA/133 abar m4096@0xfea5b000 port 0xfea5b380 irq 38 Oct 29 04:39:11.369874 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Oct 29 04:39:11.375367 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Oct 29 04:39:11.380562 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Oct 29 04:39:11.386886 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Oct 29 04:39:11.389353 systemd[1]: Starting disk-uuid.service... Oct 29 04:39:11.397393 disk-uuid[529]: Primary Header is updated. Oct 29 04:39:11.397393 disk-uuid[529]: Secondary Entries is updated. Oct 29 04:39:11.397393 disk-uuid[529]: Secondary Header is updated. Oct 29 04:39:11.405639 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Oct 29 04:39:11.409629 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Oct 29 04:39:11.602910 kernel: ata3: SATA link down (SStatus 0 SControl 300) Oct 29 04:39:11.603021 kernel: ata2: SATA link down (SStatus 0 SControl 300) Oct 29 04:39:11.604705 kernel: ata1: SATA link down (SStatus 0 SControl 300) Oct 29 04:39:11.607936 kernel: ata6: SATA link down (SStatus 0 SControl 300) Oct 29 04:39:11.607977 kernel: ata5: SATA link down (SStatus 0 SControl 300) Oct 29 04:39:11.609632 kernel: ata4: SATA link down (SStatus 0 SControl 300) Oct 29 04:39:11.626644 kernel: xhci_hcd 0000:03:00.0: xHCI Host Controller Oct 29 04:39:11.641733 kernel: xhci_hcd 0000:03:00.0: new USB bus registered, assigned bus number 1 Oct 29 04:39:11.641972 kernel: xhci_hcd 0000:03:00.0: hcc params 0x00087001 hci version 0x100 quirks 0x0000000000000010 Oct 29 04:39:11.642144 kernel: xhci_hcd 0000:03:00.0: xHCI Host Controller Oct 29 04:39:11.642311 kernel: xhci_hcd 0000:03:00.0: new USB bus registered, assigned bus number 2 Oct 29 04:39:11.642484 kernel: xhci_hcd 0000:03:00.0: Host supports USB 3.0 SuperSpeed Oct 29 04:39:11.642672 kernel: hub 1-0:1.0: USB hub found Oct 29 04:39:11.642925 kernel: hub 1-0:1.0: 4 ports detected Oct 29 04:39:11.643132 kernel: usb usb2: We don't know the algorithms for LPM for this host, disabling LPM. Oct 29 04:39:11.643345 kernel: hub 2-0:1.0: USB hub found Oct 29 04:39:11.643565 kernel: hub 2-0:1.0: 4 ports detected Oct 29 04:39:11.875687 kernel: usb 1-1: new high-speed USB device number 2 using xhci_hcd Oct 29 04:39:12.015638 kernel: hid: raw HID events driver (C) Jiri Kosina Oct 29 04:39:12.022799 kernel: usbcore: registered new interface driver usbhid Oct 29 04:39:12.022864 kernel: usbhid: USB HID core driver Oct 29 04:39:12.031618 kernel: input: QEMU QEMU USB Tablet as /devices/pci0000:00/0000:00:02.1/0000:03:00.0/usb1/1-1/1-1:1.0/0003:0627:0001.0001/input/input2 Oct 29 04:39:12.031679 kernel: hid-generic 0003:0627:0001.0001: input,hidraw0: USB HID v0.01 Mouse [QEMU QEMU USB Tablet] on usb-0000:03:00.0-1/input0 Oct 29 04:39:12.410629 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Oct 29 04:39:12.410736 disk-uuid[530]: The operation has completed successfully. Oct 29 04:39:12.486702 systemd[1]: disk-uuid.service: Deactivated successfully. Oct 29 04:39:12.489000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:12.489000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:12.486877 systemd[1]: Finished disk-uuid.service. Oct 29 04:39:12.492061 systemd[1]: Starting verity-setup.service... Oct 29 04:39:12.513641 kernel: device-mapper: verity: sha256 using implementation "sha256-avx" Oct 29 04:39:12.572682 systemd[1]: Found device dev-mapper-usr.device. Oct 29 04:39:12.575140 systemd[1]: Mounting sysusr-usr.mount... Oct 29 04:39:12.576167 systemd[1]: Finished verity-setup.service. Oct 29 04:39:12.576000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:12.680652 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Oct 29 04:39:12.681648 systemd[1]: Mounted sysusr-usr.mount. Oct 29 04:39:12.682468 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Oct 29 04:39:12.683472 systemd[1]: Starting ignition-setup.service... Oct 29 04:39:12.686150 systemd[1]: Starting parse-ip-for-networkd.service... Oct 29 04:39:12.707653 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Oct 29 04:39:12.707717 kernel: BTRFS info (device vda6): using free space tree Oct 29 04:39:12.707748 kernel: BTRFS info (device vda6): has skinny extents Oct 29 04:39:12.724252 systemd[1]: mnt-oem.mount: Deactivated successfully. Oct 29 04:39:12.731574 systemd[1]: Finished ignition-setup.service. Oct 29 04:39:12.733335 systemd[1]: Starting ignition-fetch-offline.service... Oct 29 04:39:12.731000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:12.831795 systemd[1]: Finished parse-ip-for-networkd.service. Oct 29 04:39:12.832000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:12.833000 audit: BPF prog-id=9 op=LOAD Oct 29 04:39:12.836353 systemd[1]: Starting systemd-networkd.service... Oct 29 04:39:12.882095 systemd-networkd[709]: lo: Link UP Oct 29 04:39:12.882109 systemd-networkd[709]: lo: Gained carrier Oct 29 04:39:12.883351 systemd-networkd[709]: Enumeration completed Oct 29 04:39:12.886000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:12.883848 systemd-networkd[709]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Oct 29 04:39:12.885719 systemd-networkd[709]: eth0: Link UP Oct 29 04:39:12.885725 systemd-networkd[709]: eth0: Gained carrier Oct 29 04:39:12.886446 systemd[1]: Started systemd-networkd.service. Oct 29 04:39:12.887293 systemd[1]: Reached target network.target. Oct 29 04:39:12.889673 systemd[1]: Starting iscsiuio.service... Oct 29 04:39:13.014782 systemd-networkd[709]: eth0: DHCPv4 address 10.230.43.230/30, gateway 10.230.43.229 acquired from 10.230.43.229 Oct 29 04:39:13.043000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:13.042929 systemd[1]: Started iscsiuio.service. Oct 29 04:39:13.045217 systemd[1]: Starting iscsid.service... Oct 29 04:39:13.054777 iscsid[714]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Oct 29 04:39:13.054777 iscsid[714]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Oct 29 04:39:13.054777 iscsid[714]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Oct 29 04:39:13.054777 iscsid[714]: If using hardware iscsi like qla4xxx this message can be ignored. Oct 29 04:39:13.054777 iscsid[714]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Oct 29 04:39:13.054777 iscsid[714]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Oct 29 04:39:13.059366 systemd[1]: Started iscsid.service. Oct 29 04:39:13.060000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:13.062121 systemd[1]: Starting dracut-initqueue.service... Oct 29 04:39:13.087405 systemd[1]: Finished dracut-initqueue.service. Oct 29 04:39:13.087000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:13.087685 ignition[627]: Ignition 2.14.0 Oct 29 04:39:13.088424 systemd[1]: Reached target remote-fs-pre.target. Oct 29 04:39:13.087701 ignition[627]: Stage: fetch-offline Oct 29 04:39:13.089095 systemd[1]: Reached target remote-cryptsetup.target. Oct 29 04:39:13.096000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:13.087855 ignition[627]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 29 04:39:13.089759 systemd[1]: Reached target remote-fs.target. Oct 29 04:39:13.087916 ignition[627]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Oct 29 04:39:13.094170 systemd[1]: Starting dracut-pre-mount.service... Oct 29 04:39:13.089412 ignition[627]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Oct 29 04:39:13.096842 systemd[1]: Finished ignition-fetch-offline.service. Oct 29 04:39:13.089549 ignition[627]: parsed url from cmdline: "" Oct 29 04:39:13.103907 systemd[1]: Starting ignition-fetch.service... Oct 29 04:39:13.089556 ignition[627]: no config URL provided Oct 29 04:39:13.089566 ignition[627]: reading system config file "/usr/lib/ignition/user.ign" Oct 29 04:39:13.089581 ignition[627]: no config at "/usr/lib/ignition/user.ign" Oct 29 04:39:13.089614 ignition[627]: failed to fetch config: resource requires networking Oct 29 04:39:13.090933 ignition[627]: Ignition finished successfully Oct 29 04:39:13.113000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:13.113437 systemd[1]: Finished dracut-pre-mount.service. Oct 29 04:39:13.115914 ignition[726]: Ignition 2.14.0 Oct 29 04:39:13.115933 ignition[726]: Stage: fetch Oct 29 04:39:13.116115 ignition[726]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 29 04:39:13.116159 ignition[726]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Oct 29 04:39:13.117409 ignition[726]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Oct 29 04:39:13.117548 ignition[726]: parsed url from cmdline: "" Oct 29 04:39:13.117556 ignition[726]: no config URL provided Oct 29 04:39:13.117566 ignition[726]: reading system config file "/usr/lib/ignition/user.ign" Oct 29 04:39:13.117582 ignition[726]: no config at "/usr/lib/ignition/user.ign" Oct 29 04:39:13.121341 ignition[726]: GET http://169.254.169.254/openstack/latest/user_data: attempt #1 Oct 29 04:39:13.121518 ignition[726]: config drive ("/dev/disk/by-label/config-2") not found. Waiting... Oct 29 04:39:13.121547 ignition[726]: config drive ("/dev/disk/by-label/CONFIG-2") not found. Waiting... Oct 29 04:39:13.138550 ignition[726]: GET result: OK Oct 29 04:39:13.139286 ignition[726]: parsing config with SHA512: 814ef2ea7bbe0f563bae2708db0c38c0dd2032f44658512c25c19d94eae7675cde9ed8c48c1ff3a0be60831c0a5a501280b0dce1cf25a12e45a5dfae975792d4 Oct 29 04:39:13.153219 unknown[726]: fetched base config from "system" Oct 29 04:39:13.154189 unknown[726]: fetched base config from "system" Oct 29 04:39:13.155019 unknown[726]: fetched user config from "openstack" Oct 29 04:39:13.156202 ignition[726]: fetch: fetch complete Oct 29 04:39:13.156225 ignition[726]: fetch: fetch passed Oct 29 04:39:13.156313 ignition[726]: Ignition finished successfully Oct 29 04:39:13.158505 systemd[1]: Finished ignition-fetch.service. Oct 29 04:39:13.158000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:13.161392 systemd[1]: Starting ignition-kargs.service... Oct 29 04:39:13.183810 ignition[734]: Ignition 2.14.0 Oct 29 04:39:13.183831 ignition[734]: Stage: kargs Oct 29 04:39:13.184048 ignition[734]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 29 04:39:13.184098 ignition[734]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Oct 29 04:39:13.186006 ignition[734]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Oct 29 04:39:13.188235 ignition[734]: kargs: kargs passed Oct 29 04:39:13.188335 ignition[734]: Ignition finished successfully Oct 29 04:39:13.190017 systemd[1]: Finished ignition-kargs.service. Oct 29 04:39:13.190000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:13.192008 systemd[1]: Starting ignition-disks.service... Oct 29 04:39:13.203074 ignition[739]: Ignition 2.14.0 Oct 29 04:39:13.203096 ignition[739]: Stage: disks Oct 29 04:39:13.203283 ignition[739]: reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 29 04:39:13.203318 ignition[739]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Oct 29 04:39:13.204569 ignition[739]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Oct 29 04:39:13.207000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:13.207149 systemd[1]: Finished ignition-disks.service. Oct 29 04:39:13.206158 ignition[739]: disks: disks passed Oct 29 04:39:13.208292 systemd[1]: Reached target initrd-root-device.target. Oct 29 04:39:13.206241 ignition[739]: Ignition finished successfully Oct 29 04:39:13.208956 systemd[1]: Reached target local-fs-pre.target. Oct 29 04:39:13.210142 systemd[1]: Reached target local-fs.target. Oct 29 04:39:13.211238 systemd[1]: Reached target sysinit.target. Oct 29 04:39:13.212411 systemd[1]: Reached target basic.target. Oct 29 04:39:13.214800 systemd[1]: Starting systemd-fsck-root.service... Oct 29 04:39:13.234955 systemd-fsck[746]: ROOT: clean, 637/1628000 files, 124069/1617920 blocks Oct 29 04:39:13.238900 systemd[1]: Finished systemd-fsck-root.service. Oct 29 04:39:13.239000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:13.240935 systemd[1]: Mounting sysroot.mount... Oct 29 04:39:13.252625 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Oct 29 04:39:13.253500 systemd[1]: Mounted sysroot.mount. Oct 29 04:39:13.254917 systemd[1]: Reached target initrd-root-fs.target. Oct 29 04:39:13.257794 systemd[1]: Mounting sysroot-usr.mount... Oct 29 04:39:13.259715 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Oct 29 04:39:13.261663 systemd[1]: Starting flatcar-openstack-hostname.service... Oct 29 04:39:13.263186 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Oct 29 04:39:13.263886 systemd[1]: Reached target ignition-diskful.target. Oct 29 04:39:13.268084 systemd[1]: Mounted sysroot-usr.mount. Oct 29 04:39:13.270064 systemd[1]: Starting initrd-setup-root.service... Oct 29 04:39:13.276425 initrd-setup-root[757]: cut: /sysroot/etc/passwd: No such file or directory Oct 29 04:39:13.288900 initrd-setup-root[765]: cut: /sysroot/etc/group: No such file or directory Oct 29 04:39:13.318696 initrd-setup-root[773]: cut: /sysroot/etc/shadow: No such file or directory Oct 29 04:39:13.321592 initrd-setup-root[781]: cut: /sysroot/etc/gshadow: No such file or directory Oct 29 04:39:13.392000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:13.392229 systemd[1]: Finished initrd-setup-root.service. Oct 29 04:39:13.394440 systemd[1]: Starting ignition-mount.service... Oct 29 04:39:13.404245 systemd[1]: Starting sysroot-boot.service... Oct 29 04:39:13.412822 bash[800]: umount: /sysroot/usr/share/oem: not mounted. Oct 29 04:39:13.432554 ignition[801]: INFO : Ignition 2.14.0 Oct 29 04:39:13.433626 ignition[801]: INFO : Stage: mount Oct 29 04:39:13.434486 ignition[801]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 29 04:39:13.435427 ignition[801]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Oct 29 04:39:13.438064 ignition[801]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" Oct 29 04:39:13.440500 ignition[801]: INFO : mount: mount passed Oct 29 04:39:13.441274 ignition[801]: INFO : Ignition finished successfully Oct 29 04:39:13.442932 systemd[1]: Finished ignition-mount.service. Oct 29 04:39:13.442000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:13.454000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:13.454877 systemd[1]: Finished sysroot-boot.service. Oct 29 04:39:13.463349 coreos-metadata[752]: Oct 29 04:39:13.463 INFO Fetching http://169.254.169.254/latest/meta-data/hostname: Attempt #1 Oct 29 04:39:13.479399 coreos-metadata[752]: Oct 29 04:39:13.479 INFO Fetch successful Oct 29 04:39:13.480238 coreos-metadata[752]: Oct 29 04:39:13.479 INFO wrote hostname srv-jtkau.gb1.brightbox.com to /sysroot/etc/hostname Oct 29 04:39:13.484284 systemd[1]: flatcar-openstack-hostname.service: Deactivated successfully. Oct 29 04:39:13.484438 systemd[1]: Finished flatcar-openstack-hostname.service. Oct 29 04:39:13.498000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-openstack-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:13.498000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-openstack-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:13.597522 systemd[1]: Mounting sysroot-usr-share-oem.mount... Oct 29 04:39:13.612697 kernel: BTRFS: device label OEM devid 1 transid 11 /dev/vda6 scanned by mount (809) Oct 29 04:39:13.617366 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Oct 29 04:39:13.617405 kernel: BTRFS info (device vda6): using free space tree Oct 29 04:39:13.617450 kernel: BTRFS info (device vda6): has skinny extents Oct 29 04:39:13.624079 systemd[1]: Mounted sysroot-usr-share-oem.mount. Oct 29 04:39:13.626077 systemd[1]: Starting ignition-files.service... Oct 29 04:39:13.650875 ignition[829]: INFO : Ignition 2.14.0 Oct 29 04:39:13.650875 ignition[829]: INFO : Stage: files Oct 29 04:39:13.652667 ignition[829]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 29 04:39:13.652667 ignition[829]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Oct 29 04:39:13.652667 ignition[829]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" Oct 29 04:39:13.655620 ignition[829]: DEBUG : files: compiled without relabeling support, skipping Oct 29 04:39:13.655620 ignition[829]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Oct 29 04:39:13.655620 ignition[829]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Oct 29 04:39:13.661136 ignition[829]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Oct 29 04:39:13.662562 ignition[829]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Oct 29 04:39:13.665171 ignition[829]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Oct 29 04:39:13.663448 unknown[829]: wrote ssh authorized keys file for user: core Oct 29 04:39:13.667811 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.17.0-linux-amd64.tar.gz" Oct 29 04:39:13.667811 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.17.0-linux-amd64.tar.gz: attempt #1 Oct 29 04:39:13.847577 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Oct 29 04:39:14.214266 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.17.0-linux-amd64.tar.gz" Oct 29 04:39:14.214266 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" Oct 29 04:39:14.214266 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" Oct 29 04:39:14.214266 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/nginx.yaml" Oct 29 04:39:14.214266 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/nginx.yaml" Oct 29 04:39:14.214266 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Oct 29 04:39:14.214266 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Oct 29 04:39:14.214266 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Oct 29 04:39:14.214266 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Oct 29 04:39:14.225250 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/flatcar/update.conf" Oct 29 04:39:14.225250 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/flatcar/update.conf" Oct 29 04:39:14.225250 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.32.4-x86-64.raw" Oct 29 04:39:14.225250 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.32.4-x86-64.raw" Oct 29 04:39:14.225250 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.32.4-x86-64.raw" Oct 29 04:39:14.225250 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET https://extensions.flatcar.org/extensions/kubernetes-v1.32.4-x86-64.raw: attempt #1 Oct 29 04:39:14.560095 systemd-networkd[709]: eth0: Gained IPv6LL Oct 29 04:39:14.622173 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET result: OK Oct 29 04:39:16.068959 systemd-networkd[709]: eth0: Ignoring DHCPv6 address 2a02:1348:179:8af9:24:19ff:fee6:2be6/128 (valid for 59min 59s, preferred for 59min 59s) which conflicts with 2a02:1348:179:8af9:24:19ff:fee6:2be6/64 assigned by NDisc. Oct 29 04:39:16.068979 systemd-networkd[709]: eth0: Hint: use IPv6Token= setting to change the address generated by NDisc or set UseAutonomousPrefix=no. Oct 29 04:39:17.444439 ignition[829]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.32.4-x86-64.raw" Oct 29 04:39:17.444439 ignition[829]: INFO : files: op(b): [started] processing unit "coreos-metadata-sshkeys@.service" Oct 29 04:39:17.444439 ignition[829]: INFO : files: op(b): [finished] processing unit "coreos-metadata-sshkeys@.service" Oct 29 04:39:17.448268 ignition[829]: INFO : files: op(c): [started] processing unit "prepare-helm.service" Oct 29 04:39:17.448268 ignition[829]: INFO : files: op(c): op(d): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Oct 29 04:39:17.448268 ignition[829]: INFO : files: op(c): op(d): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Oct 29 04:39:17.448268 ignition[829]: INFO : files: op(c): [finished] processing unit "prepare-helm.service" Oct 29 04:39:17.448268 ignition[829]: INFO : files: op(e): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Oct 29 04:39:17.448268 ignition[829]: INFO : files: op(e): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Oct 29 04:39:17.448268 ignition[829]: INFO : files: op(f): [started] setting preset to enabled for "prepare-helm.service" Oct 29 04:39:17.448268 ignition[829]: INFO : files: op(f): [finished] setting preset to enabled for "prepare-helm.service" Oct 29 04:39:17.457794 ignition[829]: INFO : files: createResultFile: createFiles: op(10): [started] writing file "/sysroot/etc/.ignition-result.json" Oct 29 04:39:17.457794 ignition[829]: INFO : files: createResultFile: createFiles: op(10): [finished] writing file "/sysroot/etc/.ignition-result.json" Oct 29 04:39:17.457794 ignition[829]: INFO : files: files passed Oct 29 04:39:17.457794 ignition[829]: INFO : Ignition finished successfully Oct 29 04:39:17.469766 kernel: kauditd_printk_skb: 27 callbacks suppressed Oct 29 04:39:17.469811 kernel: audit: type=1130 audit(1761712757.461:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:17.461000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:17.458165 systemd[1]: Finished ignition-files.service. Oct 29 04:39:17.463657 systemd[1]: Starting initrd-setup-root-after-ignition.service... Oct 29 04:39:17.472293 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Oct 29 04:39:17.473602 systemd[1]: Starting ignition-quench.service... Oct 29 04:39:17.478521 systemd[1]: ignition-quench.service: Deactivated successfully. Oct 29 04:39:17.478725 systemd[1]: Finished ignition-quench.service. Oct 29 04:39:17.490195 kernel: audit: type=1130 audit(1761712757.479:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:17.490231 kernel: audit: type=1131 audit(1761712757.479:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:17.479000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:17.479000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:17.490368 initrd-setup-root-after-ignition[854]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Oct 29 04:39:17.496571 kernel: audit: type=1130 audit(1761712757.490:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:17.490000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:17.485801 systemd[1]: Finished initrd-setup-root-after-ignition.service. Oct 29 04:39:17.490962 systemd[1]: Reached target ignition-complete.target. Oct 29 04:39:17.501373 systemd[1]: Starting initrd-parse-etc.service... Oct 29 04:39:17.520485 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Oct 29 04:39:17.521661 systemd[1]: Finished initrd-parse-etc.service. Oct 29 04:39:17.527674 kernel: audit: type=1130 audit(1761712757.522:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:17.522000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:17.526948 systemd[1]: Reached target initrd-fs.target. Oct 29 04:39:17.533576 kernel: audit: type=1131 audit(1761712757.526:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:17.526000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:17.532936 systemd[1]: Reached target initrd.target. Oct 29 04:39:17.534304 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Oct 29 04:39:17.535666 systemd[1]: Starting dracut-pre-pivot.service... Oct 29 04:39:17.554351 systemd[1]: Finished dracut-pre-pivot.service. Oct 29 04:39:17.555000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:17.560651 kernel: audit: type=1130 audit(1761712757.555:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:17.556898 systemd[1]: Starting initrd-cleanup.service... Oct 29 04:39:17.570278 systemd[1]: Stopped target nss-lookup.target. Oct 29 04:39:17.584916 systemd[1]: Stopped target remote-cryptsetup.target. Oct 29 04:39:17.586378 systemd[1]: Stopped target timers.target. Oct 29 04:39:17.587776 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Oct 29 04:39:17.588736 systemd[1]: Stopped dracut-pre-pivot.service. Oct 29 04:39:17.589000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:17.593920 systemd[1]: Stopped target initrd.target. Oct 29 04:39:17.598253 kernel: audit: type=1131 audit(1761712757.589:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:17.595545 systemd[1]: Stopped target basic.target. Oct 29 04:39:17.596213 systemd[1]: Stopped target ignition-complete.target. Oct 29 04:39:17.596942 systemd[1]: Stopped target ignition-diskful.target. Oct 29 04:39:17.598861 systemd[1]: Stopped target initrd-root-device.target. Oct 29 04:39:17.599798 systemd[1]: Stopped target remote-fs.target. Oct 29 04:39:17.601219 systemd[1]: Stopped target remote-fs-pre.target. Oct 29 04:39:17.602534 systemd[1]: Stopped target sysinit.target. Oct 29 04:39:17.603799 systemd[1]: Stopped target local-fs.target. Oct 29 04:39:17.605010 systemd[1]: Stopped target local-fs-pre.target. Oct 29 04:39:17.619674 kernel: audit: type=1131 audit(1761712757.607:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:17.607000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:17.606216 systemd[1]: Stopped target swap.target. Oct 29 04:39:17.607337 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Oct 29 04:39:17.607550 systemd[1]: Stopped dracut-pre-mount.service. Oct 29 04:39:17.608774 systemd[1]: Stopped target cryptsetup.target. Oct 29 04:39:17.631045 kernel: audit: type=1131 audit(1761712757.625:47): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:17.625000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:17.622729 systemd[1]: dracut-initqueue.service: Deactivated successfully. Oct 29 04:39:17.631000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:17.622990 systemd[1]: Stopped dracut-initqueue.service. Oct 29 04:39:17.632000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:17.626161 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Oct 29 04:39:17.626389 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Oct 29 04:39:17.631972 systemd[1]: ignition-files.service: Deactivated successfully. Oct 29 04:39:17.632193 systemd[1]: Stopped ignition-files.service. Oct 29 04:39:17.634902 systemd[1]: Stopping ignition-mount.service... Oct 29 04:39:17.639000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:17.643000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:17.638487 systemd[1]: Stopping iscsiuio.service... Oct 29 04:39:17.645000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:17.639071 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Oct 29 04:39:17.639262 systemd[1]: Stopped kmod-static-nodes.service. Oct 29 04:39:17.642567 systemd[1]: Stopping sysroot-boot.service... Oct 29 04:39:17.643349 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Oct 29 04:39:17.643657 systemd[1]: Stopped systemd-udev-trigger.service. Oct 29 04:39:17.656000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:17.644668 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Oct 29 04:39:17.644826 systemd[1]: Stopped dracut-pre-trigger.service. Oct 29 04:39:17.660000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:17.660000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:17.661886 ignition[867]: INFO : Ignition 2.14.0 Oct 29 04:39:17.661886 ignition[867]: INFO : Stage: umount Oct 29 04:39:17.661886 ignition[867]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Oct 29 04:39:17.661886 ignition[867]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Oct 29 04:39:17.654932 systemd[1]: iscsiuio.service: Deactivated successfully. Oct 29 04:39:17.668981 ignition[867]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" Oct 29 04:39:17.668981 ignition[867]: INFO : umount: umount passed Oct 29 04:39:17.668981 ignition[867]: INFO : Ignition finished successfully Oct 29 04:39:17.655997 systemd[1]: Stopped iscsiuio.service. Oct 29 04:39:17.659023 systemd[1]: initrd-cleanup.service: Deactivated successfully. Oct 29 04:39:17.659489 systemd[1]: Finished initrd-cleanup.service. Oct 29 04:39:17.667531 systemd[1]: ignition-mount.service: Deactivated successfully. Oct 29 04:39:17.673000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:17.667697 systemd[1]: Stopped ignition-mount.service. Oct 29 04:39:17.676000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:17.677000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:17.677000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:17.679000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:17.674226 systemd[1]: ignition-disks.service: Deactivated successfully. Oct 29 04:39:17.674307 systemd[1]: Stopped ignition-disks.service. Oct 29 04:39:17.677074 systemd[1]: ignition-kargs.service: Deactivated successfully. Oct 29 04:39:17.677138 systemd[1]: Stopped ignition-kargs.service. Oct 29 04:39:17.677775 systemd[1]: ignition-fetch.service: Deactivated successfully. Oct 29 04:39:17.677833 systemd[1]: Stopped ignition-fetch.service. Oct 29 04:39:17.678476 systemd[1]: Stopped target network.target. Oct 29 04:39:17.679041 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Oct 29 04:39:17.688000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:17.679172 systemd[1]: Stopped ignition-fetch-offline.service. Oct 29 04:39:17.679829 systemd[1]: Stopped target paths.target. Oct 29 04:39:17.680353 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Oct 29 04:39:17.683693 systemd[1]: Stopped systemd-ask-password-console.path. Oct 29 04:39:17.684663 systemd[1]: Stopped target slices.target. Oct 29 04:39:17.685201 systemd[1]: Stopped target sockets.target. Oct 29 04:39:17.685819 systemd[1]: iscsid.socket: Deactivated successfully. Oct 29 04:39:17.685867 systemd[1]: Closed iscsid.socket. Oct 29 04:39:17.696000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:17.687093 systemd[1]: iscsiuio.socket: Deactivated successfully. Oct 29 04:39:17.687156 systemd[1]: Closed iscsiuio.socket. Oct 29 04:39:17.700000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:17.688198 systemd[1]: ignition-setup.service: Deactivated successfully. Oct 29 04:39:17.702000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:17.688262 systemd[1]: Stopped ignition-setup.service. Oct 29 04:39:17.704000 audit: BPF prog-id=6 op=UNLOAD Oct 29 04:39:17.690108 systemd[1]: Stopping systemd-networkd.service... Oct 29 04:39:17.704000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:17.691267 systemd[1]: Stopping systemd-resolved.service... Oct 29 04:39:17.693661 systemd-networkd[709]: eth0: DHCPv6 lease lost Oct 29 04:39:17.706000 audit: BPF prog-id=9 op=UNLOAD Oct 29 04:39:17.695587 systemd[1]: sysroot-boot.mount: Deactivated successfully. Oct 29 04:39:17.710000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:17.696339 systemd[1]: systemd-networkd.service: Deactivated successfully. Oct 29 04:39:17.711000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:17.696477 systemd[1]: Stopped systemd-networkd.service. Oct 29 04:39:17.713000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:17.698023 systemd[1]: sysroot-boot.service: Deactivated successfully. Oct 29 04:39:17.698138 systemd[1]: Stopped sysroot-boot.service. Oct 29 04:39:17.701878 systemd[1]: systemd-resolved.service: Deactivated successfully. Oct 29 04:39:17.702072 systemd[1]: Stopped systemd-resolved.service. Oct 29 04:39:17.703585 systemd[1]: systemd-networkd.socket: Deactivated successfully. Oct 29 04:39:17.703686 systemd[1]: Closed systemd-networkd.socket. Oct 29 04:39:17.704339 systemd[1]: initrd-setup-root.service: Deactivated successfully. Oct 29 04:39:17.704398 systemd[1]: Stopped initrd-setup-root.service. Oct 29 04:39:17.706734 systemd[1]: Stopping network-cleanup.service... Oct 29 04:39:17.720000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:17.707553 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Oct 29 04:39:17.707667 systemd[1]: Stopped parse-ip-for-networkd.service. Oct 29 04:39:17.711181 systemd[1]: systemd-sysctl.service: Deactivated successfully. Oct 29 04:39:17.711255 systemd[1]: Stopped systemd-sysctl.service. Oct 29 04:39:17.727000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:17.712828 systemd[1]: systemd-modules-load.service: Deactivated successfully. Oct 29 04:39:17.729000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:17.712888 systemd[1]: Stopped systemd-modules-load.service. Oct 29 04:39:17.730000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:17.714081 systemd[1]: Stopping systemd-udevd.service... Oct 29 04:39:17.716426 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Oct 29 04:39:17.720274 systemd[1]: systemd-udevd.service: Deactivated successfully. Oct 29 04:39:17.720587 systemd[1]: Stopped systemd-udevd.service. Oct 29 04:39:17.722393 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Oct 29 04:39:17.722474 systemd[1]: Closed systemd-udevd-control.socket. Oct 29 04:39:17.723536 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Oct 29 04:39:17.723716 systemd[1]: Closed systemd-udevd-kernel.socket. Oct 29 04:39:17.727180 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Oct 29 04:39:17.727264 systemd[1]: Stopped dracut-pre-udev.service. Oct 29 04:39:17.728589 systemd[1]: dracut-cmdline.service: Deactivated successfully. Oct 29 04:39:17.728701 systemd[1]: Stopped dracut-cmdline.service. Oct 29 04:39:17.729796 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Oct 29 04:39:17.754000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:17.729853 systemd[1]: Stopped dracut-cmdline-ask.service. Oct 29 04:39:17.732527 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Oct 29 04:39:17.756000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:17.753696 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Oct 29 04:39:17.757000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:17.757000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:17.753825 systemd[1]: Stopped systemd-vconsole-setup.service. Oct 29 04:39:17.756041 systemd[1]: network-cleanup.service: Deactivated successfully. Oct 29 04:39:17.756203 systemd[1]: Stopped network-cleanup.service. Oct 29 04:39:17.757698 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Oct 29 04:39:17.757826 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Oct 29 04:39:17.758784 systemd[1]: Reached target initrd-switch-root.target. Oct 29 04:39:17.761073 systemd[1]: Starting initrd-switch-root.service... Oct 29 04:39:17.779175 systemd[1]: Switching root. Oct 29 04:39:17.804232 iscsid[714]: iscsid shutting down. Oct 29 04:39:17.805196 systemd-journald[202]: Received SIGTERM from PID 1 (systemd). Oct 29 04:39:17.805310 systemd-journald[202]: Journal stopped Oct 29 04:39:22.996450 kernel: SELinux: Class mctp_socket not defined in policy. Oct 29 04:39:22.996571 kernel: SELinux: Class anon_inode not defined in policy. Oct 29 04:39:22.996699 kernel: SELinux: the above unknown classes and permissions will be allowed Oct 29 04:39:22.996741 kernel: SELinux: policy capability network_peer_controls=1 Oct 29 04:39:22.996776 kernel: SELinux: policy capability open_perms=1 Oct 29 04:39:22.996807 kernel: SELinux: policy capability extended_socket_class=1 Oct 29 04:39:22.996942 kernel: SELinux: policy capability always_check_network=0 Oct 29 04:39:22.996979 kernel: SELinux: policy capability cgroup_seclabel=1 Oct 29 04:39:22.996997 kernel: SELinux: policy capability nnp_nosuid_transition=1 Oct 29 04:39:22.997016 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Oct 29 04:39:22.997053 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Oct 29 04:39:22.997420 systemd[1]: Successfully loaded SELinux policy in 65.128ms. Oct 29 04:39:22.997479 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 16.188ms. Oct 29 04:39:22.997524 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Oct 29 04:39:22.998094 systemd[1]: Detected virtualization kvm. Oct 29 04:39:22.998122 systemd[1]: Detected architecture x86-64. Oct 29 04:39:22.999003 systemd[1]: Detected first boot. Oct 29 04:39:22.999034 systemd[1]: Hostname set to . Oct 29 04:39:22.999077 systemd[1]: Initializing machine ID from VM UUID. Oct 29 04:39:22.999124 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Oct 29 04:39:22.999158 systemd[1]: Populated /etc with preset unit settings. Oct 29 04:39:22.999185 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 29 04:39:22.999208 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 29 04:39:22.999230 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 29 04:39:22.999251 kernel: kauditd_printk_skb: 47 callbacks suppressed Oct 29 04:39:22.999282 kernel: audit: type=1334 audit(1761712762.700:88): prog-id=12 op=LOAD Oct 29 04:39:22.999308 kernel: audit: type=1334 audit(1761712762.702:89): prog-id=3 op=UNLOAD Oct 29 04:39:22.999327 kernel: audit: type=1334 audit(1761712762.703:90): prog-id=13 op=LOAD Oct 29 04:39:22.999346 kernel: audit: type=1334 audit(1761712762.705:91): prog-id=14 op=LOAD Oct 29 04:39:22.999364 kernel: audit: type=1334 audit(1761712762.705:92): prog-id=4 op=UNLOAD Oct 29 04:39:22.999382 kernel: audit: type=1334 audit(1761712762.705:93): prog-id=5 op=UNLOAD Oct 29 04:39:22.999408 kernel: audit: type=1131 audit(1761712762.707:94): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:22.999439 systemd[1]: iscsid.service: Deactivated successfully. Oct 29 04:39:22.999460 systemd[1]: Stopped iscsid.service. Oct 29 04:39:22.999502 kernel: audit: type=1334 audit(1761712762.720:95): prog-id=12 op=UNLOAD Oct 29 04:39:22.999531 kernel: audit: type=1131 audit(1761712762.722:96): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:22.999558 systemd[1]: initrd-switch-root.service: Deactivated successfully. Oct 29 04:39:22.999585 systemd[1]: Stopped initrd-switch-root.service. Oct 29 04:39:22.999618 kernel: audit: type=1130 audit(1761712762.731:97): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:22.999639 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Oct 29 04:39:22.999675 systemd[1]: Created slice system-addon\x2dconfig.slice. Oct 29 04:39:22.999698 systemd[1]: Created slice system-addon\x2drun.slice. Oct 29 04:39:22.999719 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Oct 29 04:39:22.999738 systemd[1]: Created slice system-getty.slice. Oct 29 04:39:22.999758 systemd[1]: Created slice system-modprobe.slice. Oct 29 04:39:22.999789 systemd[1]: Created slice system-serial\x2dgetty.slice. Oct 29 04:39:22.999807 systemd[1]: Created slice system-system\x2dcloudinit.slice. Oct 29 04:39:22.999826 systemd[1]: Created slice system-systemd\x2dfsck.slice. Oct 29 04:39:22.999856 systemd[1]: Created slice user.slice. Oct 29 04:39:22.999885 systemd[1]: Started systemd-ask-password-console.path. Oct 29 04:39:22.999916 systemd[1]: Started systemd-ask-password-wall.path. Oct 29 04:39:22.999934 systemd[1]: Set up automount boot.automount. Oct 29 04:39:22.999951 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Oct 29 04:39:22.999978 systemd[1]: Stopped target initrd-switch-root.target. Oct 29 04:39:23.000008 systemd[1]: Stopped target initrd-fs.target. Oct 29 04:39:23.000026 systemd[1]: Stopped target initrd-root-fs.target. Oct 29 04:39:23.000045 systemd[1]: Reached target integritysetup.target. Oct 29 04:39:23.000087 systemd[1]: Reached target remote-cryptsetup.target. Oct 29 04:39:23.000109 systemd[1]: Reached target remote-fs.target. Oct 29 04:39:23.000142 systemd[1]: Reached target slices.target. Oct 29 04:39:23.000161 systemd[1]: Reached target swap.target. Oct 29 04:39:23.000188 systemd[1]: Reached target torcx.target. Oct 29 04:39:23.000207 systemd[1]: Reached target veritysetup.target. Oct 29 04:39:23.000225 systemd[1]: Listening on systemd-coredump.socket. Oct 29 04:39:23.000250 systemd[1]: Listening on systemd-initctl.socket. Oct 29 04:39:23.000418 systemd[1]: Listening on systemd-networkd.socket. Oct 29 04:39:23.000465 systemd[1]: Listening on systemd-udevd-control.socket. Oct 29 04:39:23.000488 systemd[1]: Listening on systemd-udevd-kernel.socket. Oct 29 04:39:23.000527 systemd[1]: Listening on systemd-userdbd.socket. Oct 29 04:39:23.000548 systemd[1]: Mounting dev-hugepages.mount... Oct 29 04:39:23.000574 systemd[1]: Mounting dev-mqueue.mount... Oct 29 04:39:23.000594 systemd[1]: Mounting media.mount... Oct 29 04:39:23.002255 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Oct 29 04:39:23.002277 systemd[1]: Mounting sys-kernel-debug.mount... Oct 29 04:39:23.002309 systemd[1]: Mounting sys-kernel-tracing.mount... Oct 29 04:39:23.002329 systemd[1]: Mounting tmp.mount... Oct 29 04:39:23.002363 systemd[1]: Starting flatcar-tmpfiles.service... Oct 29 04:39:23.002397 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Oct 29 04:39:23.002417 systemd[1]: Starting kmod-static-nodes.service... Oct 29 04:39:23.002436 systemd[1]: Starting modprobe@configfs.service... Oct 29 04:39:23.002468 systemd[1]: Starting modprobe@dm_mod.service... Oct 29 04:39:23.002502 systemd[1]: Starting modprobe@drm.service... Oct 29 04:39:23.002525 systemd[1]: Starting modprobe@efi_pstore.service... Oct 29 04:39:23.002545 systemd[1]: Starting modprobe@fuse.service... Oct 29 04:39:23.002564 systemd[1]: Starting modprobe@loop.service... Oct 29 04:39:23.002971 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Oct 29 04:39:23.003032 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Oct 29 04:39:23.003053 systemd[1]: Stopped systemd-fsck-root.service. Oct 29 04:39:23.003078 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Oct 29 04:39:23.003109 systemd[1]: Stopped systemd-fsck-usr.service. Oct 29 04:39:23.003135 systemd[1]: Stopped systemd-journald.service. Oct 29 04:39:23.003153 systemd[1]: Starting systemd-journald.service... Oct 29 04:39:23.003171 systemd[1]: Starting systemd-modules-load.service... Oct 29 04:39:23.003203 systemd[1]: Starting systemd-network-generator.service... Oct 29 04:39:23.003250 systemd[1]: Starting systemd-remount-fs.service... Oct 29 04:39:23.003270 kernel: loop: module loaded Oct 29 04:39:23.003307 systemd[1]: Starting systemd-udev-trigger.service... Oct 29 04:39:23.003333 systemd[1]: verity-setup.service: Deactivated successfully. Oct 29 04:39:23.003365 systemd[1]: Stopped verity-setup.service. Oct 29 04:39:23.003384 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Oct 29 04:39:23.003404 systemd[1]: Mounted dev-hugepages.mount. Oct 29 04:39:23.003436 systemd[1]: Mounted dev-mqueue.mount. Oct 29 04:39:23.003455 systemd[1]: Mounted media.mount. Oct 29 04:39:23.003487 systemd[1]: Mounted sys-kernel-debug.mount. Oct 29 04:39:23.003527 systemd[1]: Mounted sys-kernel-tracing.mount. Oct 29 04:39:23.003548 kernel: fuse: init (API version 7.34) Oct 29 04:39:23.003567 systemd[1]: Mounted tmp.mount. Oct 29 04:39:23.003587 systemd[1]: Finished kmod-static-nodes.service. Oct 29 04:39:23.005146 systemd[1]: modprobe@configfs.service: Deactivated successfully. Oct 29 04:39:23.005175 systemd[1]: Finished modprobe@configfs.service. Oct 29 04:39:23.005210 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Oct 29 04:39:23.005233 systemd[1]: Finished modprobe@dm_mod.service. Oct 29 04:39:23.005254 systemd[1]: modprobe@drm.service: Deactivated successfully. Oct 29 04:39:23.005274 systemd[1]: Finished modprobe@drm.service. Oct 29 04:39:23.005293 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Oct 29 04:39:23.007337 systemd[1]: Finished modprobe@efi_pstore.service. Oct 29 04:39:23.007390 systemd[1]: modprobe@fuse.service: Deactivated successfully. Oct 29 04:39:23.007440 systemd[1]: Finished modprobe@fuse.service. Oct 29 04:39:23.007474 systemd-journald[986]: Journal started Oct 29 04:39:23.007583 systemd-journald[986]: Runtime Journal (/run/log/journal/cc479577199b479fb28b6f677da4d739) is 4.7M, max 38.1M, 33.3M free. Oct 29 04:39:17.985000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Oct 29 04:39:18.057000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Oct 29 04:39:18.057000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Oct 29 04:39:18.057000 audit: BPF prog-id=10 op=LOAD Oct 29 04:39:18.057000 audit: BPF prog-id=10 op=UNLOAD Oct 29 04:39:18.057000 audit: BPF prog-id=11 op=LOAD Oct 29 04:39:18.057000 audit: BPF prog-id=11 op=UNLOAD Oct 29 04:39:18.189000 audit[900]: AVC avc: denied { associate } for pid=900 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Oct 29 04:39:18.189000 audit[900]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c00014d88c a1=c0000cede0 a2=c0000d70c0 a3=32 items=0 ppid=883 pid=900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:39:18.189000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Oct 29 04:39:18.192000 audit[900]: AVC avc: denied { associate } for pid=900 comm="torcx-generator" name="lib" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Oct 29 04:39:18.192000 audit[900]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c00014d965 a2=1ed a3=0 items=2 ppid=883 pid=900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:39:18.192000 audit: CWD cwd="/" Oct 29 04:39:18.192000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:39:18.192000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:39:18.192000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Oct 29 04:39:22.700000 audit: BPF prog-id=12 op=LOAD Oct 29 04:39:22.702000 audit: BPF prog-id=3 op=UNLOAD Oct 29 04:39:22.703000 audit: BPF prog-id=13 op=LOAD Oct 29 04:39:22.705000 audit: BPF prog-id=14 op=LOAD Oct 29 04:39:22.705000 audit: BPF prog-id=4 op=UNLOAD Oct 29 04:39:22.705000 audit: BPF prog-id=5 op=UNLOAD Oct 29 04:39:22.707000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:22.720000 audit: BPF prog-id=12 op=UNLOAD Oct 29 04:39:22.722000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:22.731000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:22.731000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:22.901000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:22.907000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:22.909000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:22.909000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:22.910000 audit: BPF prog-id=15 op=LOAD Oct 29 04:39:22.910000 audit: BPF prog-id=16 op=LOAD Oct 29 04:39:22.910000 audit: BPF prog-id=17 op=LOAD Oct 29 04:39:22.910000 audit: BPF prog-id=13 op=UNLOAD Oct 29 04:39:22.910000 audit: BPF prog-id=14 op=UNLOAD Oct 29 04:39:22.946000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:22.980000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:22.985000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:23.011710 systemd[1]: modprobe@loop.service: Deactivated successfully. Oct 29 04:39:23.011762 systemd[1]: Finished modprobe@loop.service. Oct 29 04:39:23.011794 systemd[1]: Started systemd-journald.service. Oct 29 04:39:22.985000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:22.986000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Oct 29 04:39:22.986000 audit[986]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=3 a1=7ffcd1e71d90 a2=4000 a3=7ffcd1e71e2c items=0 ppid=1 pid=986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:39:22.986000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Oct 29 04:39:22.993000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:22.993000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:22.997000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:22.997000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:23.002000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:23.002000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:23.006000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:23.006000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:23.011000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:23.011000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:22.696017 systemd[1]: Queued start job for default target multi-user.target. Oct 29 04:39:18.186993 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2025-10-29T04:39:18Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Oct 29 04:39:22.696043 systemd[1]: Unnecessary job was removed for dev-vda6.device. Oct 29 04:39:18.187803 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2025-10-29T04:39:18Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Oct 29 04:39:23.013000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:22.707823 systemd[1]: systemd-journald.service: Deactivated successfully. Oct 29 04:39:18.187857 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2025-10-29T04:39:18Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Oct 29 04:39:18.187922 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2025-10-29T04:39:18Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Oct 29 04:39:18.187941 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2025-10-29T04:39:18Z" level=debug msg="skipped missing lower profile" missing profile=oem Oct 29 04:39:18.188007 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2025-10-29T04:39:18Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Oct 29 04:39:18.188031 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2025-10-29T04:39:18Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Oct 29 04:39:18.188483 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2025-10-29T04:39:18Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Oct 29 04:39:18.188593 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2025-10-29T04:39:18Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Oct 29 04:39:18.188651 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2025-10-29T04:39:18Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Oct 29 04:39:23.016000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:18.189455 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2025-10-29T04:39:18Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Oct 29 04:39:23.016784 systemd[1]: Finished systemd-modules-load.service. Oct 29 04:39:18.189515 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2025-10-29T04:39:18Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Oct 29 04:39:23.018239 systemd[1]: Finished flatcar-tmpfiles.service. Oct 29 04:39:18.189548 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2025-10-29T04:39:18Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.8: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.8 Oct 29 04:39:18.189576 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2025-10-29T04:39:18Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Oct 29 04:39:23.019000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:23.020000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:23.021000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:18.189641 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2025-10-29T04:39:18Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.8: no such file or directory" path=/var/lib/torcx/store/3510.3.8 Oct 29 04:39:23.020489 systemd[1]: Finished systemd-network-generator.service. Oct 29 04:39:18.189671 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2025-10-29T04:39:18Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Oct 29 04:39:23.021633 systemd[1]: Finished systemd-remount-fs.service. Oct 29 04:39:22.097158 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2025-10-29T04:39:22Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 29 04:39:22.097724 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2025-10-29T04:39:22Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 29 04:39:22.098054 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2025-10-29T04:39:22Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 29 04:39:22.098610 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2025-10-29T04:39:22Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Oct 29 04:39:22.098722 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2025-10-29T04:39:22Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Oct 29 04:39:22.098909 /usr/lib/systemd/system-generators/torcx-generator[900]: time="2025-10-29T04:39:22Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Oct 29 04:39:23.024940 systemd[1]: Reached target network-pre.target. Oct 29 04:39:23.027388 systemd[1]: Mounting sys-fs-fuse-connections.mount... Oct 29 04:39:23.033265 systemd[1]: Mounting sys-kernel-config.mount... Oct 29 04:39:23.036482 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Oct 29 04:39:23.039463 systemd[1]: Starting systemd-hwdb-update.service... Oct 29 04:39:23.045810 systemd[1]: Starting systemd-journal-flush.service... Oct 29 04:39:23.046532 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Oct 29 04:39:23.048133 systemd[1]: Starting systemd-random-seed.service... Oct 29 04:39:23.048883 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Oct 29 04:39:23.050460 systemd[1]: Starting systemd-sysctl.service... Oct 29 04:39:23.052908 systemd[1]: Starting systemd-sysusers.service... Oct 29 04:39:23.058100 systemd[1]: Mounted sys-fs-fuse-connections.mount. Oct 29 04:39:23.060326 systemd-journald[986]: Time spent on flushing to /var/log/journal/cc479577199b479fb28b6f677da4d739 is 73.872ms for 1292 entries. Oct 29 04:39:23.060326 systemd-journald[986]: System Journal (/var/log/journal/cc479577199b479fb28b6f677da4d739) is 8.0M, max 584.8M, 576.8M free. Oct 29 04:39:23.151247 systemd-journald[986]: Received client request to flush runtime journal. Oct 29 04:39:23.069000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:23.104000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:23.126000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:23.067043 systemd[1]: Mounted sys-kernel-config.mount. Oct 29 04:39:23.069504 systemd[1]: Finished systemd-random-seed.service. Oct 29 04:39:23.070279 systemd[1]: Reached target first-boot-complete.target. Oct 29 04:39:23.103979 systemd[1]: Finished systemd-sysctl.service. Oct 29 04:39:23.126760 systemd[1]: Finished systemd-sysusers.service. Oct 29 04:39:23.152665 systemd[1]: Finished systemd-journal-flush.service. Oct 29 04:39:23.152000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:23.190166 systemd[1]: Finished systemd-udev-trigger.service. Oct 29 04:39:23.190000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:23.193028 systemd[1]: Starting systemd-udev-settle.service... Oct 29 04:39:23.203542 udevadm[1010]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Oct 29 04:39:23.838252 systemd[1]: Finished systemd-hwdb-update.service. Oct 29 04:39:23.838000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:23.839000 audit: BPF prog-id=18 op=LOAD Oct 29 04:39:23.839000 audit: BPF prog-id=19 op=LOAD Oct 29 04:39:23.839000 audit: BPF prog-id=7 op=UNLOAD Oct 29 04:39:23.839000 audit: BPF prog-id=8 op=UNLOAD Oct 29 04:39:23.841090 systemd[1]: Starting systemd-udevd.service... Oct 29 04:39:23.865952 systemd-udevd[1011]: Using default interface naming scheme 'v252'. Oct 29 04:39:23.898000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:23.899000 audit: BPF prog-id=20 op=LOAD Oct 29 04:39:23.898251 systemd[1]: Started systemd-udevd.service. Oct 29 04:39:23.901500 systemd[1]: Starting systemd-networkd.service... Oct 29 04:39:23.911000 audit: BPF prog-id=21 op=LOAD Oct 29 04:39:23.911000 audit: BPF prog-id=22 op=LOAD Oct 29 04:39:23.911000 audit: BPF prog-id=23 op=LOAD Oct 29 04:39:23.913203 systemd[1]: Starting systemd-userdbd.service... Oct 29 04:39:23.975490 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Oct 29 04:39:23.977000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:23.977107 systemd[1]: Started systemd-userdbd.service. Oct 29 04:39:24.078936 systemd-networkd[1018]: lo: Link UP Oct 29 04:39:24.078952 systemd-networkd[1018]: lo: Gained carrier Oct 29 04:39:24.079825 systemd-networkd[1018]: Enumeration completed Oct 29 04:39:24.080000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:24.079948 systemd[1]: Started systemd-networkd.service. Oct 29 04:39:24.081232 systemd-networkd[1018]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Oct 29 04:39:24.083275 systemd-networkd[1018]: eth0: Link UP Oct 29 04:39:24.083299 systemd-networkd[1018]: eth0: Gained carrier Oct 29 04:39:24.097757 systemd-networkd[1018]: eth0: DHCPv4 address 10.230.43.230/30, gateway 10.230.43.229 acquired from 10.230.43.229 Oct 29 04:39:24.116623 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input3 Oct 29 04:39:24.136643 kernel: mousedev: PS/2 mouse device common for all mice Oct 29 04:39:24.247633 kernel: ACPI: button: Power Button [PWRF] Oct 29 04:39:24.263000 audit[1015]: AVC avc: denied { confidentiality } for pid=1015 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Oct 29 04:39:24.276346 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Oct 29 04:39:24.263000 audit[1015]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55a92650a0a0 a1=338ec a2=7f84e4361bc5 a3=5 items=110 ppid=1011 pid=1015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:39:24.263000 audit: CWD cwd="/" Oct 29 04:39:24.263000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:39:24.263000 audit: PATH item=1 name=(null) inode=15565 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:39:24.263000 audit: PATH item=2 name=(null) inode=15565 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:39:24.263000 audit: PATH item=3 name=(null) inode=15566 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:39:24.263000 audit: PATH item=4 name=(null) inode=15565 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:39:24.263000 audit: PATH item=5 name=(null) inode=15567 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:39:24.263000 audit: PATH item=6 name=(null) inode=15565 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:39:24.263000 audit: PATH item=7 name=(null) inode=15568 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:39:24.263000 audit: PATH item=8 name=(null) inode=15568 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:39:24.263000 audit: PATH item=9 name=(null) inode=15569 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:39:24.263000 audit: PATH item=10 name=(null) inode=15568 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:39:24.263000 audit: PATH item=11 name=(null) inode=15570 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:39:24.263000 audit: PATH item=12 name=(null) inode=15568 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:39:24.263000 audit: PATH item=13 name=(null) inode=15571 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:39:24.263000 audit: PATH item=14 name=(null) inode=15568 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:39:24.263000 audit: PATH item=15 name=(null) inode=15572 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:39:24.263000 audit: PATH item=16 name=(null) inode=15568 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:39:24.263000 audit: PATH item=17 name=(null) inode=15573 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:39:24.263000 audit: PATH item=18 name=(null) inode=15565 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:39:24.263000 audit: PATH item=19 name=(null) inode=15574 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:39:24.263000 audit: PATH item=20 name=(null) inode=15574 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:39:24.263000 audit: PATH item=21 name=(null) inode=15575 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:39:24.263000 audit: PATH item=22 name=(null) inode=15574 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:39:24.263000 audit: PATH item=23 name=(null) inode=15576 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:39:24.263000 audit: PATH item=24 name=(null) inode=15574 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:39:24.263000 audit: PATH item=25 name=(null) inode=15577 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:39:24.263000 audit: PATH item=26 name=(null) inode=15574 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:39:24.263000 audit: PATH item=27 name=(null) inode=15578 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:39:24.263000 audit: PATH item=28 name=(null) inode=15574 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:39:24.263000 audit: PATH item=29 name=(null) inode=15579 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:39:24.263000 audit: PATH item=30 name=(null) inode=15565 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:39:24.263000 audit: PATH item=31 name=(null) inode=15580 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:39:24.263000 audit: PATH item=32 name=(null) inode=15580 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:39:24.263000 audit: PATH item=33 name=(null) inode=15581 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:39:24.263000 audit: PATH item=34 name=(null) inode=15580 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:39:24.263000 audit: PATH item=35 name=(null) inode=15582 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:39:24.263000 audit: PATH item=36 name=(null) inode=15580 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:39:24.263000 audit: PATH item=37 name=(null) inode=15583 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:39:24.263000 audit: PATH item=38 name=(null) inode=15580 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:39:24.263000 audit: PATH item=39 name=(null) inode=15584 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:39:24.263000 audit: PATH item=40 name=(null) inode=15580 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:39:24.263000 audit: PATH item=41 name=(null) inode=15585 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:39:24.263000 audit: PATH item=42 name=(null) inode=15565 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:39:24.263000 audit: PATH item=43 name=(null) inode=15586 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:39:24.263000 audit: PATH item=44 name=(null) inode=15586 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:39:24.263000 audit: PATH item=45 name=(null) inode=15587 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:39:24.263000 audit: PATH item=46 name=(null) inode=15586 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:39:24.263000 audit: PATH item=47 name=(null) inode=15588 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:39:24.263000 audit: PATH item=48 name=(null) inode=15586 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:39:24.263000 audit: PATH item=49 name=(null) inode=15589 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:39:24.263000 audit: PATH item=50 name=(null) inode=15586 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:39:24.263000 audit: PATH item=51 name=(null) inode=15590 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:39:24.263000 audit: PATH item=52 name=(null) inode=15586 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:39:24.263000 audit: PATH item=53 name=(null) inode=15591 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:39:24.263000 audit: PATH item=54 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:39:24.263000 audit: PATH item=55 name=(null) inode=15592 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:39:24.263000 audit: PATH item=56 name=(null) inode=15592 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:39:24.263000 audit: PATH item=57 name=(null) inode=15593 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:39:24.263000 audit: PATH item=58 name=(null) inode=15592 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:39:24.263000 audit: PATH item=59 name=(null) inode=15594 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:39:24.263000 audit: PATH item=60 name=(null) inode=15592 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:39:24.263000 audit: PATH item=61 name=(null) inode=15595 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:39:24.263000 audit: PATH item=62 name=(null) inode=15595 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:39:24.263000 audit: PATH item=63 name=(null) inode=15596 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:39:24.263000 audit: PATH item=64 name=(null) inode=15595 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:39:24.263000 audit: PATH item=65 name=(null) inode=15597 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:39:24.263000 audit: PATH item=66 name=(null) inode=15595 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:39:24.263000 audit: PATH item=67 name=(null) inode=15598 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:39:24.263000 audit: PATH item=68 name=(null) inode=15595 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:39:24.263000 audit: PATH item=69 name=(null) inode=15599 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:39:24.263000 audit: PATH item=70 name=(null) inode=15595 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:39:24.263000 audit: PATH item=71 name=(null) inode=15600 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:39:24.263000 audit: PATH item=72 name=(null) inode=15592 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:39:24.263000 audit: PATH item=73 name=(null) inode=15601 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:39:24.263000 audit: PATH item=74 name=(null) inode=15601 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:39:24.263000 audit: PATH item=75 name=(null) inode=15602 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:39:24.263000 audit: PATH item=76 name=(null) inode=15601 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:39:24.263000 audit: PATH item=77 name=(null) inode=15603 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:39:24.263000 audit: PATH item=78 name=(null) inode=15601 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:39:24.263000 audit: PATH item=79 name=(null) inode=15604 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:39:24.263000 audit: PATH item=80 name=(null) inode=15601 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:39:24.263000 audit: PATH item=81 name=(null) inode=15605 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:39:24.263000 audit: PATH item=82 name=(null) inode=15601 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:39:24.263000 audit: PATH item=83 name=(null) inode=15606 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:39:24.263000 audit: PATH item=84 name=(null) inode=15592 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:39:24.263000 audit: PATH item=85 name=(null) inode=15607 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:39:24.263000 audit: PATH item=86 name=(null) inode=15607 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:39:24.263000 audit: PATH item=87 name=(null) inode=15608 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:39:24.263000 audit: PATH item=88 name=(null) inode=15607 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:39:24.263000 audit: PATH item=89 name=(null) inode=15609 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:39:24.263000 audit: PATH item=90 name=(null) inode=15607 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:39:24.263000 audit: PATH item=91 name=(null) inode=15610 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:39:24.263000 audit: PATH item=92 name=(null) inode=15607 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:39:24.263000 audit: PATH item=93 name=(null) inode=15611 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:39:24.263000 audit: PATH item=94 name=(null) inode=15607 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:39:24.263000 audit: PATH item=95 name=(null) inode=15612 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:39:24.263000 audit: PATH item=96 name=(null) inode=15592 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:39:24.263000 audit: PATH item=97 name=(null) inode=15613 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:39:24.263000 audit: PATH item=98 name=(null) inode=15613 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:39:24.263000 audit: PATH item=99 name=(null) inode=15614 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:39:24.295692 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input4 Oct 29 04:39:24.263000 audit: PATH item=100 name=(null) inode=15613 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:39:24.263000 audit: PATH item=101 name=(null) inode=15615 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:39:24.263000 audit: PATH item=102 name=(null) inode=15613 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:39:24.263000 audit: PATH item=103 name=(null) inode=15616 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:39:24.263000 audit: PATH item=104 name=(null) inode=15613 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:39:24.263000 audit: PATH item=105 name=(null) inode=15617 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:39:24.263000 audit: PATH item=106 name=(null) inode=15613 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:39:24.263000 audit: PATH item=107 name=(null) inode=15618 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:39:24.263000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:39:24.263000 audit: PATH item=109 name=(null) inode=15619 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:39:24.263000 audit: PROCTITLE proctitle="(udev-worker)" Oct 29 04:39:24.337630 kernel: i801_smbus 0000:00:1f.3: SMBus using PCI interrupt Oct 29 04:39:24.357380 kernel: i2c i2c-0: 1/1 memory slots populated (from DMI) Oct 29 04:39:24.357696 kernel: i2c i2c-0: Memory type 0x07 not supported yet, not instantiating SPD Oct 29 04:39:24.505234 systemd[1]: Finished systemd-udev-settle.service. Oct 29 04:39:24.505000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:24.508134 systemd[1]: Starting lvm2-activation-early.service... Oct 29 04:39:24.530710 lvm[1040]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Oct 29 04:39:24.567189 systemd[1]: Finished lvm2-activation-early.service. Oct 29 04:39:24.567000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:24.568130 systemd[1]: Reached target cryptsetup.target. Oct 29 04:39:24.570591 systemd[1]: Starting lvm2-activation.service... Oct 29 04:39:24.575621 lvm[1041]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Oct 29 04:39:24.613057 systemd[1]: Finished lvm2-activation.service. Oct 29 04:39:24.613922 systemd[1]: Reached target local-fs-pre.target. Oct 29 04:39:24.613000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:24.614544 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Oct 29 04:39:24.614587 systemd[1]: Reached target local-fs.target. Oct 29 04:39:24.615190 systemd[1]: Reached target machines.target. Oct 29 04:39:24.617531 systemd[1]: Starting ldconfig.service... Oct 29 04:39:24.622021 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Oct 29 04:39:24.622089 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 29 04:39:24.624279 systemd[1]: Starting systemd-boot-update.service... Oct 29 04:39:24.627092 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Oct 29 04:39:24.634990 systemd[1]: Starting systemd-machine-id-commit.service... Oct 29 04:39:24.639365 systemd[1]: Starting systemd-sysext.service... Oct 29 04:39:24.641407 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1043 (bootctl) Oct 29 04:39:24.645708 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Oct 29 04:39:24.655754 systemd[1]: Unmounting usr-share-oem.mount... Oct 29 04:39:24.676236 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Oct 29 04:39:24.676000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:24.680396 systemd[1]: usr-share-oem.mount: Deactivated successfully. Oct 29 04:39:24.680743 systemd[1]: Unmounted usr-share-oem.mount. Oct 29 04:39:24.702651 kernel: loop0: detected capacity change from 0 to 224512 Oct 29 04:39:24.805200 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Oct 29 04:39:24.807000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:24.807697 systemd[1]: Finished systemd-machine-id-commit.service. Oct 29 04:39:24.831754 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Oct 29 04:39:24.854633 kernel: loop1: detected capacity change from 0 to 224512 Oct 29 04:39:24.867498 (sd-sysext)[1055]: Using extensions 'kubernetes'. Oct 29 04:39:24.869702 (sd-sysext)[1055]: Merged extensions into '/usr'. Oct 29 04:39:24.882357 systemd-fsck[1052]: fsck.fat 4.2 (2021-01-31) Oct 29 04:39:24.882357 systemd-fsck[1052]: /dev/vda1: 790 files, 120772/258078 clusters Oct 29 04:39:24.884000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:24.884583 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Oct 29 04:39:24.887326 systemd[1]: Mounting boot.mount... Oct 29 04:39:24.921428 systemd[1]: Mounted boot.mount. Oct 29 04:39:24.925398 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Oct 29 04:39:24.928348 systemd[1]: Mounting usr-share-oem.mount... Oct 29 04:39:24.930435 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Oct 29 04:39:24.934023 systemd[1]: Starting modprobe@dm_mod.service... Oct 29 04:39:24.939289 systemd[1]: Starting modprobe@efi_pstore.service... Oct 29 04:39:24.942325 systemd[1]: Starting modprobe@loop.service... Oct 29 04:39:24.944064 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Oct 29 04:39:24.944888 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 29 04:39:24.945081 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Oct 29 04:39:24.951412 systemd[1]: Mounted usr-share-oem.mount. Oct 29 04:39:24.953790 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Oct 29 04:39:24.954149 systemd[1]: Finished modprobe@dm_mod.service. Oct 29 04:39:24.954000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:24.954000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:24.955742 systemd[1]: Finished systemd-sysext.service. Oct 29 04:39:24.957000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:24.959416 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Oct 29 04:39:24.960241 systemd[1]: Finished modprobe@efi_pstore.service. Oct 29 04:39:24.961000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:24.961000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:24.962540 systemd[1]: Finished systemd-boot-update.service. Oct 29 04:39:24.962000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:24.963949 systemd[1]: modprobe@loop.service: Deactivated successfully. Oct 29 04:39:24.964261 systemd[1]: Finished modprobe@loop.service. Oct 29 04:39:24.964000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:24.964000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:24.969755 systemd[1]: Starting ensure-sysext.service... Oct 29 04:39:24.970575 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Oct 29 04:39:24.970757 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Oct 29 04:39:24.972342 systemd[1]: Starting systemd-tmpfiles-setup.service... Oct 29 04:39:24.983106 systemd[1]: Reloading. Oct 29 04:39:25.063441 systemd-tmpfiles[1063]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Oct 29 04:39:25.075062 systemd-tmpfiles[1063]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Oct 29 04:39:25.086475 systemd-tmpfiles[1063]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Oct 29 04:39:25.178974 /usr/lib/systemd/system-generators/torcx-generator[1082]: time="2025-10-29T04:39:25Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Oct 29 04:39:25.179031 /usr/lib/systemd/system-generators/torcx-generator[1082]: time="2025-10-29T04:39:25Z" level=info msg="torcx already run" Oct 29 04:39:25.253874 ldconfig[1042]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Oct 29 04:39:25.282511 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 29 04:39:25.282536 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 29 04:39:25.309664 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 29 04:39:25.391000 audit: BPF prog-id=24 op=LOAD Oct 29 04:39:25.392000 audit: BPF prog-id=25 op=LOAD Oct 29 04:39:25.392000 audit: BPF prog-id=18 op=UNLOAD Oct 29 04:39:25.392000 audit: BPF prog-id=19 op=UNLOAD Oct 29 04:39:25.392000 audit: BPF prog-id=26 op=LOAD Oct 29 04:39:25.392000 audit: BPF prog-id=21 op=UNLOAD Oct 29 04:39:25.392000 audit: BPF prog-id=27 op=LOAD Oct 29 04:39:25.393000 audit: BPF prog-id=28 op=LOAD Oct 29 04:39:25.393000 audit: BPF prog-id=22 op=UNLOAD Oct 29 04:39:25.393000 audit: BPF prog-id=23 op=UNLOAD Oct 29 04:39:25.393000 audit: BPF prog-id=29 op=LOAD Oct 29 04:39:25.393000 audit: BPF prog-id=20 op=UNLOAD Oct 29 04:39:25.400000 audit: BPF prog-id=30 op=LOAD Oct 29 04:39:25.400000 audit: BPF prog-id=15 op=UNLOAD Oct 29 04:39:25.400000 audit: BPF prog-id=31 op=LOAD Oct 29 04:39:25.400000 audit: BPF prog-id=32 op=LOAD Oct 29 04:39:25.400000 audit: BPF prog-id=16 op=UNLOAD Oct 29 04:39:25.400000 audit: BPF prog-id=17 op=UNLOAD Oct 29 04:39:25.411990 systemd[1]: Finished ldconfig.service. Oct 29 04:39:25.423000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:25.428000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:25.428059 systemd[1]: Finished systemd-tmpfiles-setup.service. Oct 29 04:39:25.437391 systemd[1]: Starting audit-rules.service... Oct 29 04:39:25.440547 systemd[1]: Starting clean-ca-certificates.service... Oct 29 04:39:25.445554 systemd[1]: Starting systemd-journal-catalog-update.service... Oct 29 04:39:25.449000 audit: BPF prog-id=33 op=LOAD Oct 29 04:39:25.453374 systemd[1]: Starting systemd-resolved.service... Oct 29 04:39:25.454000 audit: BPF prog-id=34 op=LOAD Oct 29 04:39:25.457119 systemd[1]: Starting systemd-timesyncd.service... Oct 29 04:39:25.461285 systemd[1]: Starting systemd-update-utmp.service... Oct 29 04:39:25.464284 systemd[1]: Finished clean-ca-certificates.service. Oct 29 04:39:25.465000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:25.469883 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Oct 29 04:39:25.471000 audit[1136]: SYSTEM_BOOT pid=1136 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Oct 29 04:39:25.482966 systemd[1]: Finished systemd-update-utmp.service. Oct 29 04:39:25.483000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:25.484275 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Oct 29 04:39:25.487037 systemd[1]: Starting modprobe@dm_mod.service... Oct 29 04:39:25.491831 systemd[1]: Starting modprobe@efi_pstore.service... Oct 29 04:39:25.494648 systemd[1]: Starting modprobe@loop.service... Oct 29 04:39:25.495429 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Oct 29 04:39:25.495665 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 29 04:39:25.495899 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Oct 29 04:39:25.498500 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Oct 29 04:39:25.499339 systemd[1]: Finished modprobe@dm_mod.service. Oct 29 04:39:25.499000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:25.499000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:25.500767 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Oct 29 04:39:25.501304 systemd[1]: Finished modprobe@efi_pstore.service. Oct 29 04:39:25.503000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:25.503000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:25.504260 systemd[1]: modprobe@loop.service: Deactivated successfully. Oct 29 04:39:25.504459 systemd[1]: Finished modprobe@loop.service. Oct 29 04:39:25.504000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:25.504000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:25.507400 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Oct 29 04:39:25.510836 systemd[1]: Starting modprobe@dm_mod.service... Oct 29 04:39:25.514404 systemd[1]: Starting modprobe@efi_pstore.service... Oct 29 04:39:25.519694 systemd[1]: Starting modprobe@loop.service... Oct 29 04:39:25.520404 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Oct 29 04:39:25.520582 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 29 04:39:25.520768 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Oct 29 04:39:25.522106 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Oct 29 04:39:25.522381 systemd[1]: Finished modprobe@dm_mod.service. Oct 29 04:39:25.523000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:25.523000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:25.524458 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Oct 29 04:39:25.524683 systemd[1]: Finished modprobe@efi_pstore.service. Oct 29 04:39:25.524000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:25.524000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:25.525845 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Oct 29 04:39:25.530066 systemd[1]: modprobe@loop.service: Deactivated successfully. Oct 29 04:39:25.530698 systemd[1]: Finished modprobe@loop.service. Oct 29 04:39:25.530000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:25.530000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:25.532104 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Oct 29 04:39:25.534932 systemd[1]: Starting modprobe@dm_mod.service... Oct 29 04:39:25.537845 systemd[1]: Starting modprobe@drm.service... Oct 29 04:39:25.541908 systemd[1]: Starting modprobe@efi_pstore.service... Oct 29 04:39:25.542753 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Oct 29 04:39:25.542954 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 29 04:39:25.545031 systemd[1]: Starting systemd-networkd-wait-online.service... Oct 29 04:39:25.546346 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Oct 29 04:39:25.548073 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Oct 29 04:39:25.549697 systemd[1]: Finished modprobe@dm_mod.service. Oct 29 04:39:25.549000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:25.549000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:25.551055 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Oct 29 04:39:25.551252 systemd[1]: Finished modprobe@efi_pstore.service. Oct 29 04:39:25.551000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:25.551000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:25.552792 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Oct 29 04:39:25.552911 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Oct 29 04:39:25.555154 systemd[1]: Finished ensure-sysext.service. Oct 29 04:39:25.555000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:25.556904 systemd[1]: modprobe@drm.service: Deactivated successfully. Oct 29 04:39:25.557101 systemd[1]: Finished modprobe@drm.service. Oct 29 04:39:25.557000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:25.557000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:25.568275 systemd-networkd[1018]: eth0: Gained IPv6LL Oct 29 04:39:25.575522 systemd[1]: Finished systemd-networkd-wait-online.service. Oct 29 04:39:25.575000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:25.592062 systemd[1]: Finished systemd-journal-catalog-update.service. Oct 29 04:39:25.594585 systemd[1]: Starting systemd-update-done.service... Oct 29 04:39:25.592000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:25.605884 systemd[1]: Finished systemd-update-done.service. Oct 29 04:39:25.608000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-done comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:25.614000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Oct 29 04:39:25.614000 audit[1161]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe2ce2e010 a2=420 a3=0 items=0 ppid=1130 pid=1161 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:39:25.614000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Oct 29 04:39:25.615110 augenrules[1161]: No rules Oct 29 04:39:25.616941 systemd[1]: Finished audit-rules.service. Oct 29 04:39:25.626646 systemd[1]: Started systemd-timesyncd.service. Oct 29 04:39:25.627380 systemd[1]: Reached target time-set.target. Oct 29 04:39:25.630764 systemd-resolved[1133]: Positive Trust Anchors: Oct 29 04:39:25.631339 systemd-resolved[1133]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Oct 29 04:39:25.631512 systemd-resolved[1133]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Oct 29 04:39:25.639307 systemd-resolved[1133]: Using system hostname 'srv-jtkau.gb1.brightbox.com'. Oct 29 04:39:25.642223 systemd[1]: Started systemd-resolved.service. Oct 29 04:39:25.655815 systemd[1]: Reached target network.target. Oct 29 04:39:25.656401 systemd[1]: Reached target network-online.target. Oct 29 04:39:25.657009 systemd[1]: Reached target nss-lookup.target. Oct 29 04:39:25.657593 systemd[1]: Reached target sysinit.target. Oct 29 04:39:25.658312 systemd[1]: Started motdgen.path. Oct 29 04:39:25.658941 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Oct 29 04:39:25.659910 systemd[1]: Started logrotate.timer. Oct 29 04:39:25.660627 systemd[1]: Started mdadm.timer. Oct 29 04:39:25.661150 systemd[1]: Started systemd-tmpfiles-clean.timer. Oct 29 04:39:25.661770 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Oct 29 04:39:25.661818 systemd[1]: Reached target paths.target. Oct 29 04:39:25.662364 systemd[1]: Reached target timers.target. Oct 29 04:39:25.663421 systemd[1]: Listening on dbus.socket. Oct 29 04:39:25.665672 systemd[1]: Starting docker.socket... Oct 29 04:39:25.670098 systemd[1]: Listening on sshd.socket. Oct 29 04:39:25.670830 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 29 04:39:25.671472 systemd[1]: Listening on docker.socket. Oct 29 04:39:25.672163 systemd[1]: Reached target sockets.target. Oct 29 04:39:25.672791 systemd[1]: Reached target basic.target. Oct 29 04:39:25.673416 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Oct 29 04:39:25.673480 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Oct 29 04:39:25.674997 systemd[1]: Starting containerd.service... Oct 29 04:39:25.677708 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Oct 29 04:39:25.680151 systemd[1]: Starting dbus.service... Oct 29 04:39:25.683781 systemd[1]: Starting enable-oem-cloudinit.service... Oct 29 04:39:25.688798 systemd[1]: Starting extend-filesystems.service... Oct 29 04:39:25.689566 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Oct 29 04:39:25.694100 systemd[1]: Starting kubelet.service... Oct 29 04:39:25.697244 jq[1174]: false Oct 29 04:39:25.696771 systemd[1]: Starting motdgen.service... Oct 29 04:39:25.704978 systemd[1]: Starting prepare-helm.service... Oct 29 04:39:25.707520 systemd[1]: Starting ssh-key-proc-cmdline.service... Oct 29 04:39:25.720042 systemd[1]: Starting sshd-keygen.service... Oct 29 04:39:25.727226 systemd[1]: Starting systemd-logind.service... Oct 29 04:39:25.728296 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Oct 29 04:39:25.729868 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Oct 29 04:39:25.731390 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Oct 29 04:39:25.733376 systemd[1]: Starting update-engine.service... Oct 29 04:39:25.737808 systemd[1]: Starting update-ssh-keys-after-ignition.service... Oct 29 04:39:25.748495 dbus-daemon[1171]: [system] SELinux support is enabled Oct 29 04:39:25.769994 extend-filesystems[1175]: Found loop1 Oct 29 04:39:25.779708 extend-filesystems[1175]: Found vda Oct 29 04:39:25.779708 extend-filesystems[1175]: Found vda1 Oct 29 04:39:25.779708 extend-filesystems[1175]: Found vda2 Oct 29 04:39:25.779708 extend-filesystems[1175]: Found vda3 Oct 29 04:39:25.832592 extend-filesystems[1175]: Found usr Oct 29 04:39:25.832592 extend-filesystems[1175]: Found vda4 Oct 29 04:39:25.832592 extend-filesystems[1175]: Found vda6 Oct 29 04:39:25.832592 extend-filesystems[1175]: Found vda7 Oct 29 04:39:25.832592 extend-filesystems[1175]: Found vda9 Oct 29 04:39:25.832592 extend-filesystems[1175]: Checking size of /dev/vda9 Oct 29 04:39:25.828328 dbus-daemon[1171]: [system] Activating systemd to hand-off: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.0' (uid=244 pid=1018 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0") Oct 29 04:39:25.859618 jq[1193]: true Oct 29 04:39:25.836616 systemd[1]: Started dbus.service. Oct 29 04:39:25.863498 dbus-daemon[1171]: [system] Successfully activated service 'org.freedesktop.systemd1' Oct 29 04:39:25.844246 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Oct 29 04:39:25.845680 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Oct 29 04:39:25.848347 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Oct 29 04:39:25.848724 systemd[1]: Finished ssh-key-proc-cmdline.service. Oct 29 04:39:25.906119 tar[1201]: linux-amd64/LICENSE Oct 29 04:39:25.906119 tar[1201]: linux-amd64/helm Oct 29 04:39:25.862285 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Oct 29 04:39:25.911550 jq[1202]: true Oct 29 04:39:25.862394 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Oct 29 04:39:25.862497 systemd[1]: Reached target system-config.target. Oct 29 04:39:25.863268 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Oct 29 04:39:25.863338 systemd[1]: Reached target user-config.target. Oct 29 04:39:25.864043 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Oct 29 04:39:25.870740 systemd[1]: Starting systemd-hostnamed.service... Oct 29 04:39:25.969979 systemd-timesyncd[1134]: Contacted time server 77.74.199.184:123 (0.flatcar.pool.ntp.org). Oct 29 04:39:25.970100 systemd-timesyncd[1134]: Initial clock synchronization to Wed 2025-10-29 04:39:26.011532 UTC. Oct 29 04:39:25.999871 update_engine[1189]: I1029 04:39:25.999265 1189 main.cc:92] Flatcar Update Engine starting Oct 29 04:39:26.008841 update_engine[1189]: I1029 04:39:26.008803 1189 update_check_scheduler.cc:74] Next update check in 6m58s Oct 29 04:39:26.009388 systemd[1]: Started update-engine.service. Oct 29 04:39:26.012997 systemd[1]: Started locksmithd.service. Oct 29 04:39:26.046694 bash[1220]: Updated "/home/core/.ssh/authorized_keys" Oct 29 04:39:26.047820 systemd[1]: Finished update-ssh-keys-after-ignition.service. Oct 29 04:39:26.050477 systemd[1]: motdgen.service: Deactivated successfully. Oct 29 04:39:26.050722 systemd[1]: Finished motdgen.service. Oct 29 04:39:26.102779 systemd-networkd[1018]: eth0: Ignoring DHCPv6 address 2a02:1348:179:8af9:24:19ff:fee6:2be6/128 (valid for 59min 59s, preferred for 59min 59s) which conflicts with 2a02:1348:179:8af9:24:19ff:fee6:2be6/64 assigned by NDisc. Oct 29 04:39:26.102792 systemd-networkd[1018]: eth0: Hint: use IPv6Token= setting to change the address generated by NDisc or set UseAutonomousPrefix=no. Oct 29 04:39:26.157909 systemd-logind[1188]: Watching system buttons on /dev/input/event2 (Power Button) Oct 29 04:39:26.157958 systemd-logind[1188]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Oct 29 04:39:26.160118 systemd-logind[1188]: New seat seat0. Oct 29 04:39:26.167909 extend-filesystems[1175]: Resized partition /dev/vda9 Oct 29 04:39:26.177942 extend-filesystems[1230]: resize2fs 1.46.5 (30-Dec-2021) Oct 29 04:39:26.179765 env[1204]: time="2025-10-29T04:39:26.170522591Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Oct 29 04:39:26.180402 systemd[1]: Started systemd-logind.service. Oct 29 04:39:26.189693 kernel: EXT4-fs (vda9): resizing filesystem from 1617920 to 15121403 blocks Oct 29 04:39:26.319959 dbus-daemon[1171]: [system] Successfully activated service 'org.freedesktop.hostname1' Oct 29 04:39:26.321182 dbus-daemon[1171]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.6' (uid=0 pid=1203 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0") Oct 29 04:39:26.323504 systemd[1]: Started systemd-hostnamed.service. Oct 29 04:39:26.333072 systemd[1]: Starting polkit.service... Oct 29 04:39:26.366886 polkitd[1231]: Started polkitd version 121 Oct 29 04:39:26.379273 env[1204]: time="2025-10-29T04:39:26.379124385Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Oct 29 04:39:26.379534 env[1204]: time="2025-10-29T04:39:26.379487822Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Oct 29 04:39:26.385644 env[1204]: time="2025-10-29T04:39:26.384946045Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.192-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Oct 29 04:39:26.385644 env[1204]: time="2025-10-29T04:39:26.385033599Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Oct 29 04:39:26.385644 env[1204]: time="2025-10-29T04:39:26.385391898Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Oct 29 04:39:26.385644 env[1204]: time="2025-10-29T04:39:26.385436350Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Oct 29 04:39:26.385644 env[1204]: time="2025-10-29T04:39:26.385461532Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Oct 29 04:39:26.385644 env[1204]: time="2025-10-29T04:39:26.385485477Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Oct 29 04:39:26.385999 env[1204]: time="2025-10-29T04:39:26.385701395Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Oct 29 04:39:26.386340 env[1204]: time="2025-10-29T04:39:26.386228939Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Oct 29 04:39:26.386477 env[1204]: time="2025-10-29T04:39:26.386406677Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Oct 29 04:39:26.386477 env[1204]: time="2025-10-29T04:39:26.386450524Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Oct 29 04:39:26.386784 env[1204]: time="2025-10-29T04:39:26.386540081Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Oct 29 04:39:26.392057 env[1204]: time="2025-10-29T04:39:26.386574434Z" level=info msg="metadata content store policy set" policy=shared Oct 29 04:39:26.394260 polkitd[1231]: Loading rules from directory /etc/polkit-1/rules.d Oct 29 04:39:26.401687 polkitd[1231]: Loading rules from directory /usr/share/polkit-1/rules.d Oct 29 04:39:26.411982 polkitd[1231]: Finished loading, compiling and executing 2 rules Oct 29 04:39:26.412949 dbus-daemon[1171]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' Oct 29 04:39:26.413904 systemd[1]: Started polkit.service. Oct 29 04:39:26.415027 polkitd[1231]: Acquired the name org.freedesktop.PolicyKit1 on the system bus Oct 29 04:39:26.434696 env[1204]: time="2025-10-29T04:39:26.434636347Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Oct 29 04:39:26.434842 env[1204]: time="2025-10-29T04:39:26.434717489Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Oct 29 04:39:26.434842 env[1204]: time="2025-10-29T04:39:26.434750278Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Oct 29 04:39:26.434979 env[1204]: time="2025-10-29T04:39:26.434898788Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Oct 29 04:39:26.435071 env[1204]: time="2025-10-29T04:39:26.435024053Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Oct 29 04:39:26.435071 env[1204]: time="2025-10-29T04:39:26.435056254Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Oct 29 04:39:26.435157 env[1204]: time="2025-10-29T04:39:26.435092926Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Oct 29 04:39:26.435157 env[1204]: time="2025-10-29T04:39:26.435122954Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Oct 29 04:39:26.435243 env[1204]: time="2025-10-29T04:39:26.435150506Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Oct 29 04:39:26.435243 env[1204]: time="2025-10-29T04:39:26.435182534Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Oct 29 04:39:26.435243 env[1204]: time="2025-10-29T04:39:26.435211127Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Oct 29 04:39:26.435376 env[1204]: time="2025-10-29T04:39:26.435239783Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Oct 29 04:39:26.435492 env[1204]: time="2025-10-29T04:39:26.435445025Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Oct 29 04:39:26.435690 env[1204]: time="2025-10-29T04:39:26.435659144Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Oct 29 04:39:26.436308 env[1204]: time="2025-10-29T04:39:26.436276643Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Oct 29 04:39:26.436383 env[1204]: time="2025-10-29T04:39:26.436340097Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Oct 29 04:39:26.436464 env[1204]: time="2025-10-29T04:39:26.436394389Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Oct 29 04:39:26.436775 env[1204]: time="2025-10-29T04:39:26.436740898Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Oct 29 04:39:26.436856 env[1204]: time="2025-10-29T04:39:26.436779836Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Oct 29 04:39:26.436856 env[1204]: time="2025-10-29T04:39:26.436832476Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Oct 29 04:39:26.436938 env[1204]: time="2025-10-29T04:39:26.436861013Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Oct 29 04:39:26.436938 env[1204]: time="2025-10-29T04:39:26.436883230Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Oct 29 04:39:26.437016 env[1204]: time="2025-10-29T04:39:26.436946036Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Oct 29 04:39:26.437016 env[1204]: time="2025-10-29T04:39:26.436991107Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Oct 29 04:39:26.437122 env[1204]: time="2025-10-29T04:39:26.437012911Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Oct 29 04:39:26.437122 env[1204]: time="2025-10-29T04:39:26.437043213Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Oct 29 04:39:26.439227 env[1204]: time="2025-10-29T04:39:26.439187468Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Oct 29 04:39:26.439321 env[1204]: time="2025-10-29T04:39:26.439225822Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Oct 29 04:39:26.439321 env[1204]: time="2025-10-29T04:39:26.439269052Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Oct 29 04:39:26.439321 env[1204]: time="2025-10-29T04:39:26.439297264Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Oct 29 04:39:26.439443 env[1204]: time="2025-10-29T04:39:26.439341765Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Oct 29 04:39:26.439443 env[1204]: time="2025-10-29T04:39:26.439364057Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Oct 29 04:39:26.439443 env[1204]: time="2025-10-29T04:39:26.439430820Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Oct 29 04:39:26.439598 env[1204]: time="2025-10-29T04:39:26.439529199Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Oct 29 04:39:26.450147 systemd[1]: Started containerd.service. Oct 29 04:39:26.470846 env[1204]: time="2025-10-29T04:39:26.440073665Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Oct 29 04:39:26.470846 env[1204]: time="2025-10-29T04:39:26.441410075Z" level=info msg="Connect containerd service" Oct 29 04:39:26.470846 env[1204]: time="2025-10-29T04:39:26.441529165Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Oct 29 04:39:26.470846 env[1204]: time="2025-10-29T04:39:26.443119731Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Oct 29 04:39:26.470846 env[1204]: time="2025-10-29T04:39:26.444277706Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Oct 29 04:39:26.470846 env[1204]: time="2025-10-29T04:39:26.448782047Z" level=info msg="Start subscribing containerd event" Oct 29 04:39:26.470846 env[1204]: time="2025-10-29T04:39:26.448933268Z" level=info msg="Start recovering state" Oct 29 04:39:26.470846 env[1204]: time="2025-10-29T04:39:26.449157250Z" level=info msg="Start event monitor" Oct 29 04:39:26.470846 env[1204]: time="2025-10-29T04:39:26.449302449Z" level=info msg="Start snapshots syncer" Oct 29 04:39:26.470846 env[1204]: time="2025-10-29T04:39:26.449336218Z" level=info msg="Start cni network conf syncer for default" Oct 29 04:39:26.470846 env[1204]: time="2025-10-29T04:39:26.449351242Z" level=info msg="Start streaming server" Oct 29 04:39:26.470846 env[1204]: time="2025-10-29T04:39:26.449758243Z" level=info msg=serving... address=/run/containerd/containerd.sock Oct 29 04:39:26.470846 env[1204]: time="2025-10-29T04:39:26.451526861Z" level=info msg="containerd successfully booted in 0.285983s" Oct 29 04:39:26.491060 systemd-hostnamed[1203]: Hostname set to (static) Oct 29 04:39:26.545663 kernel: EXT4-fs (vda9): resized filesystem to 15121403 Oct 29 04:39:26.569479 extend-filesystems[1230]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required Oct 29 04:39:26.569479 extend-filesystems[1230]: old_desc_blocks = 1, new_desc_blocks = 8 Oct 29 04:39:26.569479 extend-filesystems[1230]: The filesystem on /dev/vda9 is now 15121403 (4k) blocks long. Oct 29 04:39:26.574342 extend-filesystems[1175]: Resized filesystem in /dev/vda9 Oct 29 04:39:26.570441 systemd[1]: extend-filesystems.service: Deactivated successfully. Oct 29 04:39:26.570762 systemd[1]: Finished extend-filesystems.service. Oct 29 04:39:27.286774 sshd_keygen[1198]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Oct 29 04:39:27.395578 systemd[1]: Finished sshd-keygen.service. Oct 29 04:39:27.422682 systemd[1]: Starting issuegen.service... Oct 29 04:39:27.432127 systemd[1]: issuegen.service: Deactivated successfully. Oct 29 04:39:27.432410 systemd[1]: Finished issuegen.service. Oct 29 04:39:27.436861 systemd[1]: Starting systemd-user-sessions.service... Oct 29 04:39:27.467385 systemd[1]: Finished systemd-user-sessions.service. Oct 29 04:39:27.471591 systemd[1]: Started getty@tty1.service. Oct 29 04:39:27.479904 systemd[1]: Started serial-getty@ttyS0.service. Oct 29 04:39:27.482334 systemd[1]: Reached target getty.target. Oct 29 04:39:27.773049 locksmithd[1221]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Oct 29 04:39:28.151503 tar[1201]: linux-amd64/README.md Oct 29 04:39:28.161559 systemd[1]: Finished prepare-helm.service. Oct 29 04:39:28.848413 systemd[1]: Started kubelet.service. Oct 29 04:39:29.778866 kubelet[1265]: E1029 04:39:29.778742 1265 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Oct 29 04:39:29.781859 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Oct 29 04:39:29.782177 systemd[1]: kubelet.service: Failed with result 'exit-code'. Oct 29 04:39:29.782816 systemd[1]: kubelet.service: Consumed 2.111s CPU time. Oct 29 04:39:32.195552 systemd[1]: Created slice system-sshd.slice. Oct 29 04:39:32.201192 systemd[1]: Started sshd@0-10.230.43.230:22-178.128.241.223:44040.service. Oct 29 04:39:32.495049 sshd[1272]: Invalid user admin from 178.128.241.223 port 44040 Oct 29 04:39:32.524753 sshd[1272]: pam_faillock(sshd:auth): User unknown Oct 29 04:39:32.526236 sshd[1272]: pam_unix(sshd:auth): check pass; user unknown Oct 29 04:39:32.526467 sshd[1272]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.241.223 Oct 29 04:39:32.527942 sshd[1272]: pam_faillock(sshd:auth): User unknown Oct 29 04:39:32.913877 coreos-metadata[1170]: Oct 29 04:39:32.913 WARN failed to locate config-drive, using the metadata service API instead Oct 29 04:39:32.970505 coreos-metadata[1170]: Oct 29 04:39:32.970 INFO Fetching http://169.254.169.254/latest/meta-data/public-keys: Attempt #1 Oct 29 04:39:32.998798 coreos-metadata[1170]: Oct 29 04:39:32.998 INFO Fetch successful Oct 29 04:39:32.999260 coreos-metadata[1170]: Oct 29 04:39:32.999 INFO Fetching http://169.254.169.254/latest/meta-data/public-keys/0/openssh-key: Attempt #1 Oct 29 04:39:33.028083 coreos-metadata[1170]: Oct 29 04:39:33.027 INFO Fetch successful Oct 29 04:39:33.030614 unknown[1170]: wrote ssh authorized keys file for user: core Oct 29 04:39:33.042675 update-ssh-keys[1276]: Updated "/home/core/.ssh/authorized_keys" Oct 29 04:39:33.043887 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Oct 29 04:39:33.044385 systemd[1]: Reached target multi-user.target. Oct 29 04:39:33.046866 systemd[1]: Starting systemd-update-utmp-runlevel.service... Oct 29 04:39:33.057541 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Oct 29 04:39:33.057851 systemd[1]: Finished systemd-update-utmp-runlevel.service. Oct 29 04:39:33.061802 systemd[1]: Startup finished in 1.347s (kernel) + 8.004s (initrd) + 15.154s (userspace) = 24.506s. Oct 29 04:39:34.618675 sshd[1272]: Failed password for invalid user admin from 178.128.241.223 port 44040 ssh2 Oct 29 04:39:35.562106 systemd[1]: Started sshd@1-10.230.43.230:22-147.75.109.163:43150.service. Oct 29 04:39:36.463772 sshd[1279]: Accepted publickey for core from 147.75.109.163 port 43150 ssh2: RSA SHA256:ZzxZ37pC6YJySS9q7Vi2CaqOM6Jn/4IZMTu+T8q4mXw Oct 29 04:39:36.468297 sshd[1279]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 29 04:39:36.477639 sshd[1272]: Connection closed by invalid user admin 178.128.241.223 port 44040 [preauth] Oct 29 04:39:36.477934 systemd[1]: sshd@0-10.230.43.230:22-178.128.241.223:44040.service: Deactivated successfully. Oct 29 04:39:36.490056 systemd[1]: Created slice user-500.slice. Oct 29 04:39:36.492245 systemd[1]: Starting user-runtime-dir@500.service... Oct 29 04:39:36.500864 systemd-logind[1188]: New session 1 of user core. Oct 29 04:39:36.510626 systemd[1]: Finished user-runtime-dir@500.service. Oct 29 04:39:36.515051 systemd[1]: Starting user@500.service... Oct 29 04:39:36.520753 (systemd)[1283]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Oct 29 04:39:36.629715 systemd[1283]: Queued start job for default target default.target. Oct 29 04:39:36.631410 systemd[1283]: Reached target paths.target. Oct 29 04:39:36.631650 systemd[1283]: Reached target sockets.target. Oct 29 04:39:36.631848 systemd[1283]: Reached target timers.target. Oct 29 04:39:36.632036 systemd[1283]: Reached target basic.target. Oct 29 04:39:36.632372 systemd[1283]: Reached target default.target. Oct 29 04:39:36.632520 systemd[1]: Started user@500.service. Oct 29 04:39:36.633477 systemd[1283]: Startup finished in 102ms. Oct 29 04:39:36.635919 systemd[1]: Started session-1.scope. Oct 29 04:39:37.270083 systemd[1]: Started sshd@2-10.230.43.230:22-147.75.109.163:43158.service. Oct 29 04:39:38.176143 sshd[1292]: Accepted publickey for core from 147.75.109.163 port 43158 ssh2: RSA SHA256:ZzxZ37pC6YJySS9q7Vi2CaqOM6Jn/4IZMTu+T8q4mXw Oct 29 04:39:38.178270 sshd[1292]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 29 04:39:38.185398 systemd-logind[1188]: New session 2 of user core. Oct 29 04:39:38.186299 systemd[1]: Started session-2.scope. Oct 29 04:39:38.809904 sshd[1292]: pam_unix(sshd:session): session closed for user core Oct 29 04:39:38.814585 systemd[1]: sshd@2-10.230.43.230:22-147.75.109.163:43158.service: Deactivated successfully. Oct 29 04:39:38.815810 systemd[1]: session-2.scope: Deactivated successfully. Oct 29 04:39:38.816663 systemd-logind[1188]: Session 2 logged out. Waiting for processes to exit. Oct 29 04:39:38.818022 systemd-logind[1188]: Removed session 2. Oct 29 04:39:38.957104 systemd[1]: Started sshd@3-10.230.43.230:22-147.75.109.163:43170.service. Oct 29 04:39:39.853929 sshd[1298]: Accepted publickey for core from 147.75.109.163 port 43170 ssh2: RSA SHA256:ZzxZ37pC6YJySS9q7Vi2CaqOM6Jn/4IZMTu+T8q4mXw Oct 29 04:39:39.856734 sshd[1298]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 29 04:39:39.858056 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Oct 29 04:39:39.858485 systemd[1]: Stopped kubelet.service. Oct 29 04:39:39.858550 systemd[1]: kubelet.service: Consumed 2.111s CPU time. Oct 29 04:39:39.860963 systemd[1]: Starting kubelet.service... Oct 29 04:39:39.865665 systemd-logind[1188]: New session 3 of user core. Oct 29 04:39:39.866685 systemd[1]: Started session-3.scope. Oct 29 04:39:40.289534 systemd[1]: Started kubelet.service. Oct 29 04:39:40.428473 kubelet[1305]: E1029 04:39:40.428400 1305 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Oct 29 04:39:40.433733 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Oct 29 04:39:40.434069 systemd[1]: kubelet.service: Failed with result 'exit-code'. Oct 29 04:39:40.545904 sshd[1298]: pam_unix(sshd:session): session closed for user core Oct 29 04:39:40.551081 systemd[1]: sshd@3-10.230.43.230:22-147.75.109.163:43170.service: Deactivated successfully. Oct 29 04:39:40.552394 systemd[1]: session-3.scope: Deactivated successfully. Oct 29 04:39:40.553413 systemd-logind[1188]: Session 3 logged out. Waiting for processes to exit. Oct 29 04:39:40.555644 systemd-logind[1188]: Removed session 3. Oct 29 04:39:40.698028 systemd[1]: Started sshd@4-10.230.43.230:22-147.75.109.163:34992.service. Oct 29 04:39:41.614149 sshd[1313]: Accepted publickey for core from 147.75.109.163 port 34992 ssh2: RSA SHA256:ZzxZ37pC6YJySS9q7Vi2CaqOM6Jn/4IZMTu+T8q4mXw Oct 29 04:39:41.617286 sshd[1313]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 29 04:39:41.624948 systemd-logind[1188]: New session 4 of user core. Oct 29 04:39:41.626105 systemd[1]: Started session-4.scope. Oct 29 04:39:42.251595 sshd[1313]: pam_unix(sshd:session): session closed for user core Oct 29 04:39:42.256214 systemd-logind[1188]: Session 4 logged out. Waiting for processes to exit. Oct 29 04:39:42.256798 systemd[1]: sshd@4-10.230.43.230:22-147.75.109.163:34992.service: Deactivated successfully. Oct 29 04:39:42.257787 systemd[1]: session-4.scope: Deactivated successfully. Oct 29 04:39:42.258899 systemd-logind[1188]: Removed session 4. Oct 29 04:39:42.399549 systemd[1]: Started sshd@5-10.230.43.230:22-147.75.109.163:34998.service. Oct 29 04:39:43.300570 sshd[1319]: Accepted publickey for core from 147.75.109.163 port 34998 ssh2: RSA SHA256:ZzxZ37pC6YJySS9q7Vi2CaqOM6Jn/4IZMTu+T8q4mXw Oct 29 04:39:43.302956 sshd[1319]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 29 04:39:43.311311 systemd[1]: Started session-5.scope. Oct 29 04:39:43.313097 systemd-logind[1188]: New session 5 of user core. Oct 29 04:39:43.795402 sudo[1322]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Oct 29 04:39:43.795892 sudo[1322]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 29 04:39:43.806303 dbus-daemon[1171]: \xd0m\u000f\xe7pU: received setenforce notice (enforcing=903829520) Oct 29 04:39:43.808907 sudo[1322]: pam_unix(sudo:session): session closed for user root Oct 29 04:39:43.955412 sshd[1319]: pam_unix(sshd:session): session closed for user core Oct 29 04:39:43.960813 systemd[1]: sshd@5-10.230.43.230:22-147.75.109.163:34998.service: Deactivated successfully. Oct 29 04:39:43.961009 systemd-logind[1188]: Session 5 logged out. Waiting for processes to exit. Oct 29 04:39:43.961887 systemd[1]: session-5.scope: Deactivated successfully. Oct 29 04:39:43.962969 systemd-logind[1188]: Removed session 5. Oct 29 04:39:44.106699 systemd[1]: Started sshd@6-10.230.43.230:22-147.75.109.163:35012.service. Oct 29 04:39:45.014724 sshd[1326]: Accepted publickey for core from 147.75.109.163 port 35012 ssh2: RSA SHA256:ZzxZ37pC6YJySS9q7Vi2CaqOM6Jn/4IZMTu+T8q4mXw Oct 29 04:39:45.017022 sshd[1326]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 29 04:39:45.024241 systemd-logind[1188]: New session 6 of user core. Oct 29 04:39:45.025362 systemd[1]: Started session-6.scope. Oct 29 04:39:45.501154 sudo[1330]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Oct 29 04:39:45.501573 sudo[1330]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 29 04:39:45.507955 sudo[1330]: pam_unix(sudo:session): session closed for user root Oct 29 04:39:45.515574 sudo[1329]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Oct 29 04:39:45.516590 sudo[1329]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 29 04:39:45.532522 systemd[1]: Stopping audit-rules.service... Oct 29 04:39:45.534000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Oct 29 04:39:45.536365 kernel: kauditd_printk_skb: 227 callbacks suppressed Oct 29 04:39:45.536663 kernel: audit: type=1305 audit(1761712785.534:208): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Oct 29 04:39:45.553175 kernel: audit: type=1300 audit(1761712785.534:208): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd60e49330 a2=420 a3=0 items=0 ppid=1 pid=1333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:39:45.534000 audit[1333]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd60e49330 a2=420 a3=0 items=0 ppid=1 pid=1333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:39:45.534000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Oct 29 04:39:45.540325 systemd[1]: audit-rules.service: Deactivated successfully. Oct 29 04:39:45.554761 auditctl[1333]: No rules Oct 29 04:39:45.540657 systemd[1]: Stopped audit-rules.service. Oct 29 04:39:45.539000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:45.558954 systemd[1]: Starting audit-rules.service... Oct 29 04:39:45.561434 kernel: audit: type=1327 audit(1761712785.534:208): proctitle=2F7362696E2F617564697463746C002D44 Oct 29 04:39:45.561540 kernel: audit: type=1131 audit(1761712785.539:209): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:45.592028 augenrules[1350]: No rules Oct 29 04:39:45.593000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:45.595443 sudo[1329]: pam_unix(sudo:session): session closed for user root Oct 29 04:39:45.600861 kernel: audit: type=1130 audit(1761712785.593:210): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:45.600929 kernel: audit: type=1106 audit(1761712785.594:211): pid=1329 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 29 04:39:45.594000 audit[1329]: USER_END pid=1329 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 29 04:39:45.593534 systemd[1]: Finished audit-rules.service. Oct 29 04:39:45.594000 audit[1329]: CRED_DISP pid=1329 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 29 04:39:45.611835 kernel: audit: type=1104 audit(1761712785.594:212): pid=1329 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 29 04:39:45.745988 sshd[1326]: pam_unix(sshd:session): session closed for user core Oct 29 04:39:45.749000 audit[1326]: USER_END pid=1326 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:39:45.750000 audit[1326]: CRED_DISP pid=1326 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:39:45.758308 systemd[1]: sshd@6-10.230.43.230:22-147.75.109.163:35012.service: Deactivated successfully. Oct 29 04:39:45.759622 systemd[1]: session-6.scope: Deactivated successfully. Oct 29 04:39:45.761677 systemd-logind[1188]: Session 6 logged out. Waiting for processes to exit. Oct 29 04:39:45.763987 kernel: audit: type=1106 audit(1761712785.749:213): pid=1326 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:39:45.764090 kernel: audit: type=1104 audit(1761712785.750:214): pid=1326 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:39:45.764144 kernel: audit: type=1131 audit(1761712785.758:215): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.230.43.230:22-147.75.109.163:35012 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:45.758000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.230.43.230:22-147.75.109.163:35012 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:45.763216 systemd-logind[1188]: Removed session 6. Oct 29 04:39:45.895496 systemd[1]: Started sshd@7-10.230.43.230:22-147.75.109.163:35024.service. Oct 29 04:39:45.895000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.230.43.230:22-147.75.109.163:35024 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:46.798000 audit[1356]: USER_ACCT pid=1356 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:39:46.800845 sshd[1356]: Accepted publickey for core from 147.75.109.163 port 35024 ssh2: RSA SHA256:ZzxZ37pC6YJySS9q7Vi2CaqOM6Jn/4IZMTu+T8q4mXw Oct 29 04:39:46.800000 audit[1356]: CRED_ACQ pid=1356 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:39:46.800000 audit[1356]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffedef14f40 a2=3 a3=0 items=0 ppid=1 pid=1356 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:39:46.800000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 29 04:39:46.803302 sshd[1356]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 29 04:39:46.811699 systemd-logind[1188]: New session 7 of user core. Oct 29 04:39:46.812498 systemd[1]: Started session-7.scope. Oct 29 04:39:46.819000 audit[1356]: USER_START pid=1356 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:39:46.821000 audit[1358]: CRED_ACQ pid=1358 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:39:47.282000 audit[1359]: USER_ACCT pid=1359 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 29 04:39:47.283560 sudo[1359]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Oct 29 04:39:47.283000 audit[1359]: CRED_REFR pid=1359 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 29 04:39:47.284739 sudo[1359]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Oct 29 04:39:47.287000 audit[1359]: USER_START pid=1359 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 29 04:39:47.330712 systemd[1]: Starting docker.service... Oct 29 04:39:47.447287 env[1369]: time="2025-10-29T04:39:47.447128467Z" level=info msg="Starting up" Oct 29 04:39:47.450308 env[1369]: time="2025-10-29T04:39:47.450269899Z" level=info msg="parsed scheme: \"unix\"" module=grpc Oct 29 04:39:47.450405 env[1369]: time="2025-10-29T04:39:47.450313771Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Oct 29 04:39:47.450405 env[1369]: time="2025-10-29T04:39:47.450372156Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Oct 29 04:39:47.450579 env[1369]: time="2025-10-29T04:39:47.450417535Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Oct 29 04:39:47.458204 env[1369]: time="2025-10-29T04:39:47.458157870Z" level=info msg="parsed scheme: \"unix\"" module=grpc Oct 29 04:39:47.458392 env[1369]: time="2025-10-29T04:39:47.458351281Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Oct 29 04:39:47.458528 env[1369]: time="2025-10-29T04:39:47.458497460Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Oct 29 04:39:47.458673 env[1369]: time="2025-10-29T04:39:47.458645442Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Oct 29 04:39:47.468232 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport663030056-merged.mount: Deactivated successfully. Oct 29 04:39:47.500719 env[1369]: time="2025-10-29T04:39:47.500669463Z" level=info msg="Loading containers: start." Oct 29 04:39:47.592000 audit[1401]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1401 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 04:39:47.592000 audit[1401]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffdeb1228c0 a2=0 a3=7ffdeb1228ac items=0 ppid=1369 pid=1401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:39:47.592000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Oct 29 04:39:47.595000 audit[1403]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1403 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 04:39:47.595000 audit[1403]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7fff3377a4d0 a2=0 a3=7fff3377a4bc items=0 ppid=1369 pid=1403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:39:47.595000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Oct 29 04:39:47.598000 audit[1405]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1405 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 04:39:47.598000 audit[1405]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffe9e35d290 a2=0 a3=7ffe9e35d27c items=0 ppid=1369 pid=1405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:39:47.598000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Oct 29 04:39:47.602000 audit[1407]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1407 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 04:39:47.602000 audit[1407]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffd779dbe10 a2=0 a3=7ffd779dbdfc items=0 ppid=1369 pid=1407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:39:47.602000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Oct 29 04:39:47.606000 audit[1409]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1409 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 04:39:47.606000 audit[1409]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff96dbbf80 a2=0 a3=7fff96dbbf6c items=0 ppid=1369 pid=1409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:39:47.606000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Oct 29 04:39:47.627000 audit[1414]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1414 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 04:39:47.627000 audit[1414]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe46616f40 a2=0 a3=7ffe46616f2c items=0 ppid=1369 pid=1414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:39:47.627000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Oct 29 04:39:47.655000 audit[1416]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1416 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 04:39:47.655000 audit[1416]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffee1c04f70 a2=0 a3=7ffee1c04f5c items=0 ppid=1369 pid=1416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:39:47.655000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Oct 29 04:39:47.658000 audit[1418]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1418 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 04:39:47.658000 audit[1418]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7fffa71d7660 a2=0 a3=7fffa71d764c items=0 ppid=1369 pid=1418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:39:47.658000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Oct 29 04:39:47.660000 audit[1420]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1420 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 04:39:47.660000 audit[1420]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7fff4f50f440 a2=0 a3=7fff4f50f42c items=0 ppid=1369 pid=1420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:39:47.660000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Oct 29 04:39:47.670000 audit[1424]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1424 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 04:39:47.670000 audit[1424]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffda52a7cd0 a2=0 a3=7ffda52a7cbc items=0 ppid=1369 pid=1424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:39:47.670000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Oct 29 04:39:47.675000 audit[1425]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1425 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 04:39:47.675000 audit[1425]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffe530b63f0 a2=0 a3=7ffe530b63dc items=0 ppid=1369 pid=1425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:39:47.675000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Oct 29 04:39:47.688632 kernel: Initializing XFRM netlink socket Oct 29 04:39:47.733651 env[1369]: time="2025-10-29T04:39:47.733582419Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Oct 29 04:39:47.781000 audit[1433]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1433 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 04:39:47.781000 audit[1433]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffeba92e500 a2=0 a3=7ffeba92e4ec items=0 ppid=1369 pid=1433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:39:47.781000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Oct 29 04:39:47.799000 audit[1436]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1436 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 04:39:47.799000 audit[1436]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffdf0d29310 a2=0 a3=7ffdf0d292fc items=0 ppid=1369 pid=1436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:39:47.799000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Oct 29 04:39:47.804000 audit[1439]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1439 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 04:39:47.804000 audit[1439]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7fff7299ab10 a2=0 a3=7fff7299aafc items=0 ppid=1369 pid=1439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:39:47.804000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Oct 29 04:39:47.808000 audit[1441]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1441 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 04:39:47.808000 audit[1441]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffdbb526af0 a2=0 a3=7ffdbb526adc items=0 ppid=1369 pid=1441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:39:47.808000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Oct 29 04:39:47.811000 audit[1443]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1443 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 04:39:47.811000 audit[1443]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffe08458770 a2=0 a3=7ffe0845875c items=0 ppid=1369 pid=1443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:39:47.811000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Oct 29 04:39:47.815000 audit[1445]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1445 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 04:39:47.815000 audit[1445]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffc2d7e93f0 a2=0 a3=7ffc2d7e93dc items=0 ppid=1369 pid=1445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:39:47.815000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Oct 29 04:39:47.818000 audit[1447]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1447 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 04:39:47.818000 audit[1447]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffd9cd92ba0 a2=0 a3=7ffd9cd92b8c items=0 ppid=1369 pid=1447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:39:47.818000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Oct 29 04:39:47.830000 audit[1450]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1450 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 04:39:47.830000 audit[1450]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffd77c370a0 a2=0 a3=7ffd77c3708c items=0 ppid=1369 pid=1450 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:39:47.830000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Oct 29 04:39:47.834000 audit[1452]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1452 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 04:39:47.834000 audit[1452]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffcfd9d61b0 a2=0 a3=7ffcfd9d619c items=0 ppid=1369 pid=1452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:39:47.834000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Oct 29 04:39:47.838000 audit[1454]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1454 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 04:39:47.838000 audit[1454]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffeb4cf6cb0 a2=0 a3=7ffeb4cf6c9c items=0 ppid=1369 pid=1454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:39:47.838000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Oct 29 04:39:47.841000 audit[1456]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1456 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 04:39:47.841000 audit[1456]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fffb5b62320 a2=0 a3=7fffb5b6230c items=0 ppid=1369 pid=1456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:39:47.841000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Oct 29 04:39:47.845998 systemd-networkd[1018]: docker0: Link UP Oct 29 04:39:47.855000 audit[1460]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1460 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 04:39:47.855000 audit[1460]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffed7aa3f20 a2=0 a3=7ffed7aa3f0c items=0 ppid=1369 pid=1460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:39:47.855000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Oct 29 04:39:47.861000 audit[1461]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1461 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 04:39:47.861000 audit[1461]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffc271ad320 a2=0 a3=7ffc271ad30c items=0 ppid=1369 pid=1461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:39:47.861000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Oct 29 04:39:47.864475 env[1369]: time="2025-10-29T04:39:47.864379655Z" level=info msg="Loading containers: done." Oct 29 04:39:47.903114 env[1369]: time="2025-10-29T04:39:47.903049819Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Oct 29 04:39:47.903706 env[1369]: time="2025-10-29T04:39:47.903675769Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Oct 29 04:39:47.904028 env[1369]: time="2025-10-29T04:39:47.904001353Z" level=info msg="Daemon has completed initialization" Oct 29 04:39:47.925274 systemd[1]: Started docker.service. Oct 29 04:39:47.923000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:47.939154 env[1369]: time="2025-10-29T04:39:47.938984501Z" level=info msg="API listen on /run/docker.sock" Oct 29 04:39:49.439384 env[1204]: time="2025-10-29T04:39:49.438917506Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.32.9\"" Oct 29 04:39:50.390022 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3529894074.mount: Deactivated successfully. Oct 29 04:39:50.628468 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Oct 29 04:39:50.629038 systemd[1]: Stopped kubelet.service. Oct 29 04:39:50.628000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:50.632292 kernel: kauditd_printk_skb: 84 callbacks suppressed Oct 29 04:39:50.632462 kernel: audit: type=1130 audit(1761712790.628:250): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:50.628000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:50.646743 kernel: audit: type=1131 audit(1761712790.628:251): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:50.647710 systemd[1]: Starting kubelet.service... Oct 29 04:39:51.162709 kernel: audit: type=1130 audit(1761712791.149:252): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:51.149000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:51.150955 systemd[1]: Started kubelet.service. Oct 29 04:39:51.370757 kubelet[1502]: E1029 04:39:51.370555 1502 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Oct 29 04:39:51.373000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 29 04:39:51.373997 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Oct 29 04:39:51.374370 systemd[1]: kubelet.service: Failed with result 'exit-code'. Oct 29 04:39:51.380770 kernel: audit: type=1131 audit(1761712791.373:253): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 29 04:39:55.426744 env[1204]: time="2025-10-29T04:39:55.426443698Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.32.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 04:39:55.431556 env[1204]: time="2025-10-29T04:39:55.431501059Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:abd2b525baf428ffb8b8b7d1e09761dc5cdb7ed0c7896a9427e29e84f8eafc59,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 04:39:55.435868 env[1204]: time="2025-10-29T04:39:55.435821815Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.32.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 04:39:55.439748 env[1204]: time="2025-10-29T04:39:55.439708926Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:6df11cc2ad9679b1117be34d3a0230add88bc0a08fd7a3ebc26b680575e8de97,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 04:39:55.441274 env[1204]: time="2025-10-29T04:39:55.441166965Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.32.9\" returns image reference \"sha256:abd2b525baf428ffb8b8b7d1e09761dc5cdb7ed0c7896a9427e29e84f8eafc59\"" Oct 29 04:39:55.445784 env[1204]: time="2025-10-29T04:39:55.445747102Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.32.9\"" Oct 29 04:39:56.540819 systemd[1]: systemd-hostnamed.service: Deactivated successfully. Oct 29 04:39:56.540000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:56.556667 kernel: audit: type=1131 audit(1761712796.540:254): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:39:56.570000 audit: BPF prog-id=40 op=UNLOAD Oct 29 04:39:56.570000 audit: BPF prog-id=39 op=UNLOAD Oct 29 04:39:56.574554 kernel: audit: type=1334 audit(1761712796.570:255): prog-id=40 op=UNLOAD Oct 29 04:39:56.574703 kernel: audit: type=1334 audit(1761712796.570:256): prog-id=39 op=UNLOAD Oct 29 04:39:56.574766 kernel: audit: type=1334 audit(1761712796.570:257): prog-id=38 op=UNLOAD Oct 29 04:39:56.570000 audit: BPF prog-id=38 op=UNLOAD Oct 29 04:39:58.415816 env[1204]: time="2025-10-29T04:39:58.415515863Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.32.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 04:39:58.421046 env[1204]: time="2025-10-29T04:39:58.420978241Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:0debe32fbb7223500fcf8c312f2a568a5abd3ed9274d8ec6780cfb30b8861e91,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 04:39:58.423714 env[1204]: time="2025-10-29T04:39:58.423666326Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.32.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 04:39:58.424909 env[1204]: time="2025-10-29T04:39:58.424873666Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:243c4b8e3bce271fcb1b78008ab996ab6976b1a20096deac08338fcd17979922,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 04:39:58.426646 env[1204]: time="2025-10-29T04:39:58.426581996Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.32.9\" returns image reference \"sha256:0debe32fbb7223500fcf8c312f2a568a5abd3ed9274d8ec6780cfb30b8861e91\"" Oct 29 04:39:58.431236 env[1204]: time="2025-10-29T04:39:58.431177735Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.32.9\"" Oct 29 04:40:00.917368 env[1204]: time="2025-10-29T04:40:00.917170609Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.32.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 04:40:00.921745 env[1204]: time="2025-10-29T04:40:00.921675525Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6934c23b154fcb9bf54ed5913782de746735a49f4daa4732285915050cd44ad5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 04:40:00.926797 env[1204]: time="2025-10-29T04:40:00.926746104Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.32.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 04:40:00.929546 env[1204]: time="2025-10-29T04:40:00.929509216Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:50c49520dbd0e8b4076b6a5c77d8014df09ea3d59a73e8bafd2678d51ebb92d5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 04:40:00.932806 env[1204]: time="2025-10-29T04:40:00.932641070Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.32.9\" returns image reference \"sha256:6934c23b154fcb9bf54ed5913782de746735a49f4daa4732285915050cd44ad5\"" Oct 29 04:40:00.936765 env[1204]: time="2025-10-29T04:40:00.936725759Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.32.9\"" Oct 29 04:40:01.379456 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 3. Oct 29 04:40:01.378000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:40:01.380293 systemd[1]: Stopped kubelet.service. Oct 29 04:40:01.390096 kernel: audit: type=1130 audit(1761712801.378:258): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:40:01.390324 kernel: audit: type=1131 audit(1761712801.382:259): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:40:01.382000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:40:01.391491 systemd[1]: Starting kubelet.service... Oct 29 04:40:01.837039 kernel: audit: type=1130 audit(1761712801.829:260): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:40:01.829000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:40:01.830499 systemd[1]: Started kubelet.service. Oct 29 04:40:01.979784 kubelet[1513]: E1029 04:40:01.979705 1513 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Oct 29 04:40:01.982553 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Oct 29 04:40:01.982853 systemd[1]: kubelet.service: Failed with result 'exit-code'. Oct 29 04:40:01.981000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 29 04:40:01.989731 kernel: audit: type=1131 audit(1761712801.981:261): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 29 04:40:03.523182 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1203052307.mount: Deactivated successfully. Oct 29 04:40:04.842944 env[1204]: time="2025-10-29T04:40:04.842862329Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.32.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 04:40:04.845150 env[1204]: time="2025-10-29T04:40:04.845097606Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fa3fdca615a501743d8deb39729a96e731312aac8d96accec061d5265360332f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 04:40:04.847290 env[1204]: time="2025-10-29T04:40:04.847245362Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.32.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 04:40:04.849165 env[1204]: time="2025-10-29T04:40:04.849131416Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:886af02535dc34886e4618b902f8c140d89af57233a245621d29642224516064,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 04:40:04.849901 env[1204]: time="2025-10-29T04:40:04.849836376Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.32.9\" returns image reference \"sha256:fa3fdca615a501743d8deb39729a96e731312aac8d96accec061d5265360332f\"" Oct 29 04:40:04.852785 env[1204]: time="2025-10-29T04:40:04.852746214Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.3\"" Oct 29 04:40:05.623425 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3326349008.mount: Deactivated successfully. Oct 29 04:40:07.727014 env[1204]: time="2025-10-29T04:40:07.726785164Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 04:40:07.730408 env[1204]: time="2025-10-29T04:40:07.730346202Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 04:40:07.733433 env[1204]: time="2025-10-29T04:40:07.733375376Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 04:40:07.736334 env[1204]: time="2025-10-29T04:40:07.736282403Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:9caabbf6238b189a65d0d6e6ac138de60d6a1c419e5a341fbbb7c78382559c6e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 04:40:07.737918 env[1204]: time="2025-10-29T04:40:07.737878920Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.3\" returns image reference \"sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6\"" Oct 29 04:40:07.739878 env[1204]: time="2025-10-29T04:40:07.739818125Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\"" Oct 29 04:40:08.429132 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1080421661.mount: Deactivated successfully. Oct 29 04:40:08.436079 env[1204]: time="2025-10-29T04:40:08.435984477Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 04:40:08.438475 env[1204]: time="2025-10-29T04:40:08.438434235Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 04:40:08.440691 env[1204]: time="2025-10-29T04:40:08.440640038Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 04:40:08.442527 env[1204]: time="2025-10-29T04:40:08.442487444Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:ee6521f290b2168b6e0935a181d4cff9be1ac3f505666ef0e3c98fae8199917a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 04:40:08.443423 env[1204]: time="2025-10-29T04:40:08.443377955Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\" returns image reference \"sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136\"" Oct 29 04:40:08.444682 env[1204]: time="2025-10-29T04:40:08.444634423Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.16-0\"" Oct 29 04:40:09.230401 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1914567061.mount: Deactivated successfully. Oct 29 04:40:11.573506 update_engine[1189]: I1029 04:40:11.571389 1189 update_attempter.cc:509] Updating boot flags... Oct 29 04:40:11.987164 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 4. Oct 29 04:40:11.986000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:40:11.987558 systemd[1]: Stopped kubelet.service. Oct 29 04:40:11.996668 kernel: audit: type=1130 audit(1761712811.986:262): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:40:11.994000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:40:12.007653 kernel: audit: type=1131 audit(1761712811.994:263): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:40:12.007950 systemd[1]: Starting kubelet.service... Oct 29 04:40:12.566423 systemd[1]: Started kubelet.service. Oct 29 04:40:12.565000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:40:12.572622 kernel: audit: type=1130 audit(1761712812.565:264): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:40:12.678802 kubelet[1537]: E1029 04:40:12.678710 1537 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Oct 29 04:40:12.680710 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Oct 29 04:40:12.680940 systemd[1]: kubelet.service: Failed with result 'exit-code'. Oct 29 04:40:12.679000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 29 04:40:12.686680 kernel: audit: type=1131 audit(1761712812.679:265): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 29 04:40:13.501326 env[1204]: time="2025-10-29T04:40:13.501088253Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.16-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 04:40:13.504319 env[1204]: time="2025-10-29T04:40:13.504264982Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 04:40:13.507525 env[1204]: time="2025-10-29T04:40:13.507481933Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.16-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 04:40:13.510294 env[1204]: time="2025-10-29T04:40:13.510255376Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:c6a9d11cc5c04b114ccdef39a9265eeef818e3d02f5359be035ae784097fdec5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 04:40:13.511896 env[1204]: time="2025-10-29T04:40:13.511821284Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.16-0\" returns image reference \"sha256:a9e7e6b294baf1695fccb862d956c5d3ad8510e1e4ca1535f35dc09f247abbfc\"" Oct 29 04:40:17.866415 systemd[1]: Stopped kubelet.service. Oct 29 04:40:17.866000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:40:17.885638 kernel: audit: type=1130 audit(1761712817.866:266): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:40:17.885843 kernel: audit: type=1131 audit(1761712817.866:267): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:40:17.866000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:40:17.881947 systemd[1]: Starting kubelet.service... Oct 29 04:40:17.924122 systemd[1]: Reloading. Oct 29 04:40:18.111100 /usr/lib/systemd/system-generators/torcx-generator[1588]: time="2025-10-29T04:40:18Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Oct 29 04:40:18.111272 /usr/lib/systemd/system-generators/torcx-generator[1588]: time="2025-10-29T04:40:18Z" level=info msg="torcx already run" Oct 29 04:40:18.226662 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 29 04:40:18.226730 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 29 04:40:18.256675 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 29 04:40:18.371990 kernel: audit: type=1400 audit(1761712818.361:268): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:18.372192 kernel: audit: type=1400 audit(1761712818.361:269): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:18.361000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:18.361000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:18.384678 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Oct 29 04:40:18.384796 kernel: audit: type=1400 audit(1761712818.362:270): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:18.384854 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Oct 29 04:40:18.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:18.387366 kernel: audit: backlog limit exceeded Oct 29 04:40:18.391941 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Oct 29 04:40:18.392099 kernel: audit: audit_lost=2 audit_rate_limit=0 audit_backlog_limit=64 Oct 29 04:40:18.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:18.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:18.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:18.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:18.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:18.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:18.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:18.371000 audit: BPF prog-id=43 op=LOAD Oct 29 04:40:18.371000 audit: BPF prog-id=34 op=UNLOAD Oct 29 04:40:18.376000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:18.376000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:18.376000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:18.376000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:18.376000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:18.376000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:18.376000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:18.376000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:18.376000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:18.376000 audit: BPF prog-id=44 op=LOAD Oct 29 04:40:18.376000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:18.376000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:18.376000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:18.376000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:18.376000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:18.376000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:18.376000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:18.376000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:18.376000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:18.376000 audit: BPF prog-id=45 op=LOAD Oct 29 04:40:18.376000 audit: BPF prog-id=24 op=UNLOAD Oct 29 04:40:18.376000 audit: BPF prog-id=25 op=UNLOAD Oct 29 04:40:18.377000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:18.377000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:18.377000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:18.377000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:18.377000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:18.377000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:18.377000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:18.377000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:18.377000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:18.377000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:18.377000 audit: BPF prog-id=46 op=LOAD Oct 29 04:40:18.377000 audit: BPF prog-id=26 op=UNLOAD Oct 29 04:40:18.377000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:18.377000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:18.377000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:18.377000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:18.377000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:18.377000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:18.377000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:18.377000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:18.377000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:18.377000 audit: BPF prog-id=47 op=LOAD Oct 29 04:40:18.377000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:18.377000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:18.377000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:18.377000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:18.377000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:18.377000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:18.377000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:18.377000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:18.377000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:18.377000 audit: BPF prog-id=48 op=LOAD Oct 29 04:40:18.377000 audit: BPF prog-id=27 op=UNLOAD Oct 29 04:40:18.387000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:18.387000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:18.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:18.391000 audit: BPF prog-id=49 op=LOAD Oct 29 04:40:18.391000 audit: BPF prog-id=29 op=UNLOAD Oct 29 04:40:18.397000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:18.397000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:18.397000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:18.397000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:18.397000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:18.397000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:18.397000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:18.397000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:18.397000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:18.397000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:18.397000 audit: BPF prog-id=50 op=LOAD Oct 29 04:40:18.397000 audit: BPF prog-id=33 op=UNLOAD Oct 29 04:40:18.400000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:18.400000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:18.400000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:18.400000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:18.400000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:18.400000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:18.400000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:18.400000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:18.400000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:18.400000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:18.400000 audit: BPF prog-id=51 op=LOAD Oct 29 04:40:18.400000 audit: BPF prog-id=35 op=UNLOAD Oct 29 04:40:18.401000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:18.401000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:18.401000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:18.401000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:18.401000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:18.401000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:18.401000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:18.401000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:18.401000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:18.401000 audit: BPF prog-id=52 op=LOAD Oct 29 04:40:18.401000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:18.401000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:18.401000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:18.401000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:18.401000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:18.401000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:18.401000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:18.401000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:18.401000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:18.401000 audit: BPF prog-id=53 op=LOAD Oct 29 04:40:18.401000 audit: BPF prog-id=36 op=UNLOAD Oct 29 04:40:18.401000 audit: BPF prog-id=37 op=UNLOAD Oct 29 04:40:18.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:18.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:18.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:18.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:18.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:18.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:18.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:18.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:18.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:18.404000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:18.404000 audit: BPF prog-id=54 op=LOAD Oct 29 04:40:18.404000 audit: BPF prog-id=41 op=UNLOAD Oct 29 04:40:18.404000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:18.404000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:18.404000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:18.404000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:18.404000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:18.404000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:18.404000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:18.404000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:18.404000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:18.405000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:18.405000 audit: BPF prog-id=55 op=LOAD Oct 29 04:40:18.405000 audit: BPF prog-id=30 op=UNLOAD Oct 29 04:40:18.405000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:18.405000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:18.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:18.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:18.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:18.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:18.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:18.405000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:18.405000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:18.405000 audit: BPF prog-id=56 op=LOAD Oct 29 04:40:18.405000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:18.405000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:18.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:18.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:18.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:18.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:18.405000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:18.405000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:18.405000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:18.405000 audit: BPF prog-id=57 op=LOAD Oct 29 04:40:18.405000 audit: BPF prog-id=31 op=UNLOAD Oct 29 04:40:18.405000 audit: BPF prog-id=32 op=UNLOAD Oct 29 04:40:18.436726 systemd[1]: kubelet.service: Control process exited, code=killed, status=15/TERM Oct 29 04:40:18.436905 systemd[1]: kubelet.service: Failed with result 'signal'. Oct 29 04:40:18.437453 systemd[1]: Stopped kubelet.service. Oct 29 04:40:18.436000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Oct 29 04:40:18.442045 systemd[1]: Starting kubelet.service... Oct 29 04:40:18.662340 systemd[1]: Started kubelet.service. Oct 29 04:40:18.662000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:40:18.843872 kubelet[1638]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 29 04:40:18.844898 kubelet[1638]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. Oct 29 04:40:18.844898 kubelet[1638]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 29 04:40:18.845255 kubelet[1638]: I1029 04:40:18.845162 1638 server.go:215] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Oct 29 04:40:19.198225 kubelet[1638]: I1029 04:40:19.198134 1638 server.go:520] "Kubelet version" kubeletVersion="v1.32.4" Oct 29 04:40:19.198522 kubelet[1638]: I1029 04:40:19.198501 1638 server.go:522] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Oct 29 04:40:19.199199 kubelet[1638]: I1029 04:40:19.199172 1638 server.go:954] "Client rotation is on, will bootstrap in background" Oct 29 04:40:19.246126 kubelet[1638]: E1029 04:40:19.246046 1638 certificate_manager.go:562] "Unhandled Error" err="kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post \"https://10.230.43.230:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 10.230.43.230:6443: connect: connection refused" logger="UnhandledError" Oct 29 04:40:19.249010 kubelet[1638]: I1029 04:40:19.248978 1638 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Oct 29 04:40:19.264853 kubelet[1638]: E1029 04:40:19.264801 1638 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" Oct 29 04:40:19.265131 kubelet[1638]: I1029 04:40:19.265103 1638 server.go:1421] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." Oct 29 04:40:19.273330 kubelet[1638]: I1029 04:40:19.273299 1638 server.go:772] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Oct 29 04:40:19.276877 kubelet[1638]: I1029 04:40:19.276813 1638 container_manager_linux.go:268] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Oct 29 04:40:19.277543 kubelet[1638]: I1029 04:40:19.276995 1638 container_manager_linux.go:273] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"srv-jtkau.gb1.brightbox.com","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} Oct 29 04:40:19.278064 kubelet[1638]: I1029 04:40:19.278035 1638 topology_manager.go:138] "Creating topology manager with none policy" Oct 29 04:40:19.278201 kubelet[1638]: I1029 04:40:19.278181 1638 container_manager_linux.go:304] "Creating device plugin manager" Oct 29 04:40:19.278767 kubelet[1638]: I1029 04:40:19.278743 1638 state_mem.go:36] "Initialized new in-memory state store" Oct 29 04:40:19.283958 kubelet[1638]: I1029 04:40:19.283932 1638 kubelet.go:446] "Attempting to sync node with API server" Oct 29 04:40:19.284179 kubelet[1638]: I1029 04:40:19.284153 1638 kubelet.go:341] "Adding static pod path" path="/etc/kubernetes/manifests" Oct 29 04:40:19.284426 kubelet[1638]: I1029 04:40:19.284400 1638 kubelet.go:352] "Adding apiserver pod source" Oct 29 04:40:19.284613 kubelet[1638]: I1029 04:40:19.284577 1638 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Oct 29 04:40:19.309432 kubelet[1638]: W1029 04:40:19.309282 1638 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.230.43.230:6443/api/v1/nodes?fieldSelector=metadata.name%3Dsrv-jtkau.gb1.brightbox.com&limit=500&resourceVersion=0": dial tcp 10.230.43.230:6443: connect: connection refused Oct 29 04:40:19.312692 kubelet[1638]: E1029 04:40:19.312646 1638 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://10.230.43.230:6443/api/v1/nodes?fieldSelector=metadata.name%3Dsrv-jtkau.gb1.brightbox.com&limit=500&resourceVersion=0\": dial tcp 10.230.43.230:6443: connect: connection refused" logger="UnhandledError" Oct 29 04:40:19.312692 kubelet[1638]: I1029 04:40:19.309734 1638 kuberuntime_manager.go:269] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Oct 29 04:40:19.313720 kubelet[1638]: I1029 04:40:19.313681 1638 kubelet.go:890] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Oct 29 04:40:19.315381 kubelet[1638]: W1029 04:40:19.315350 1638 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Oct 29 04:40:19.318637 kubelet[1638]: I1029 04:40:19.318613 1638 watchdog_linux.go:99] "Systemd watchdog is not enabled" Oct 29 04:40:19.318852 kubelet[1638]: I1029 04:40:19.318828 1638 server.go:1287] "Started kubelet" Oct 29 04:40:19.320324 kubelet[1638]: W1029 04:40:19.320003 1638 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.230.43.230:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 10.230.43.230:6443: connect: connection refused Oct 29 04:40:19.320324 kubelet[1638]: E1029 04:40:19.320068 1638 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://10.230.43.230:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 10.230.43.230:6443: connect: connection refused" logger="UnhandledError" Oct 29 04:40:19.325804 kubelet[1638]: I1029 04:40:19.325715 1638 server.go:169] "Starting to listen" address="0.0.0.0" port=10250 Oct 29 04:40:19.328416 kubelet[1638]: I1029 04:40:19.328390 1638 server.go:479] "Adding debug handlers to kubelet server" Oct 29 04:40:19.328000 audit[1638]: AVC avc: denied { mac_admin } for pid=1638 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:19.328000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 29 04:40:19.328000 audit[1638]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000059ec0 a1=c000c52030 a2=c000059e60 a3=25 items=0 ppid=1 pid=1638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:19.328000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 29 04:40:19.328000 audit[1638]: AVC avc: denied { mac_admin } for pid=1638 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:19.328000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 29 04:40:19.328000 audit[1638]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000a06d40 a1=c000c52048 a2=c0005a8360 a3=25 items=0 ppid=1 pid=1638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:19.328000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 29 04:40:19.330969 kubelet[1638]: I1029 04:40:19.329925 1638 kubelet.go:1507] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" Oct 29 04:40:19.330969 kubelet[1638]: I1029 04:40:19.329987 1638 kubelet.go:1511] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" Oct 29 04:40:19.330969 kubelet[1638]: I1029 04:40:19.330178 1638 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Oct 29 04:40:19.334514 kubelet[1638]: I1029 04:40:19.334370 1638 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Oct 29 04:40:19.335006 kubelet[1638]: I1029 04:40:19.334980 1638 server.go:243] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Oct 29 04:40:19.333000 audit[1650]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1650 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 04:40:19.333000 audit[1650]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffcc7e7dd70 a2=0 a3=7ffcc7e7dd5c items=0 ppid=1638 pid=1650 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:19.333000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Oct 29 04:40:19.335000 audit[1651]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1651 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 04:40:19.335000 audit[1651]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff49bc6740 a2=0 a3=7fff49bc672c items=0 ppid=1638 pid=1651 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:19.335000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Oct 29 04:40:19.338696 kubelet[1638]: I1029 04:40:19.338645 1638 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" Oct 29 04:40:19.339967 kubelet[1638]: I1029 04:40:19.339938 1638 volume_manager.go:297] "Starting Kubelet Volume Manager" Oct 29 04:40:19.340632 kubelet[1638]: E1029 04:40:19.340583 1638 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"srv-jtkau.gb1.brightbox.com\" not found" Oct 29 04:40:19.342066 kubelet[1638]: I1029 04:40:19.342040 1638 desired_state_of_world_populator.go:150] "Desired state populator starts to run" Oct 29 04:40:19.342360 kubelet[1638]: I1029 04:40:19.342335 1638 reconciler.go:26] "Reconciler: start to sync state" Oct 29 04:40:19.343000 audit[1653]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1653 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 04:40:19.343000 audit[1653]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd9072f810 a2=0 a3=7ffd9072f7fc items=0 ppid=1638 pid=1653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:19.343000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 29 04:40:19.345682 kubelet[1638]: E1029 04:40:19.339858 1638 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://10.230.43.230:6443/api/v1/namespaces/default/events\": dial tcp 10.230.43.230:6443: connect: connection refused" event="&Event{ObjectMeta:{srv-jtkau.gb1.brightbox.com.1872dc79a7bf44e4 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:srv-jtkau.gb1.brightbox.com,UID:srv-jtkau.gb1.brightbox.com,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:srv-jtkau.gb1.brightbox.com,},FirstTimestamp:2025-10-29 04:40:19.318768868 +0000 UTC m=+0.641279029,LastTimestamp:2025-10-29 04:40:19.318768868 +0000 UTC m=+0.641279029,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:srv-jtkau.gb1.brightbox.com,}" Oct 29 04:40:19.348223 kubelet[1638]: W1029 04:40:19.348168 1638 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.230.43.230:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.230.43.230:6443: connect: connection refused Oct 29 04:40:19.348315 kubelet[1638]: E1029 04:40:19.348242 1638 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://10.230.43.230:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 10.230.43.230:6443: connect: connection refused" logger="UnhandledError" Oct 29 04:40:19.348440 kubelet[1638]: E1029 04:40:19.348384 1638 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.230.43.230:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/srv-jtkau.gb1.brightbox.com?timeout=10s\": dial tcp 10.230.43.230:6443: connect: connection refused" interval="200ms" Oct 29 04:40:19.350257 kubelet[1638]: I1029 04:40:19.350228 1638 factory.go:221] Registration of the systemd container factory successfully Oct 29 04:40:19.350395 kubelet[1638]: I1029 04:40:19.350360 1638 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Oct 29 04:40:19.353380 kubelet[1638]: I1029 04:40:19.353352 1638 factory.go:221] Registration of the containerd container factory successfully Oct 29 04:40:19.354713 kubelet[1638]: E1029 04:40:19.354678 1638 kubelet.go:1555] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Oct 29 04:40:19.364000 audit[1656]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1656 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 04:40:19.364000 audit[1656]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffc759742b0 a2=0 a3=7ffc7597429c items=0 ppid=1638 pid=1656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:19.364000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 29 04:40:19.390019 kubelet[1638]: I1029 04:40:19.389949 1638 cpu_manager.go:221] "Starting CPU manager" policy="none" Oct 29 04:40:19.390019 kubelet[1638]: I1029 04:40:19.389989 1638 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" Oct 29 04:40:19.390328 kubelet[1638]: I1029 04:40:19.390051 1638 state_mem.go:36] "Initialized new in-memory state store" Oct 29 04:40:19.389000 audit[1663]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1663 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 04:40:19.389000 audit[1663]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffda94c37a0 a2=0 a3=7ffda94c378c items=0 ppid=1638 pid=1663 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:19.389000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Oct 29 04:40:19.391644 kubelet[1638]: I1029 04:40:19.391502 1638 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Oct 29 04:40:19.392249 kubelet[1638]: I1029 04:40:19.392222 1638 policy_none.go:49] "None policy: Start" Oct 29 04:40:19.392376 kubelet[1638]: I1029 04:40:19.392307 1638 memory_manager.go:186] "Starting memorymanager" policy="None" Oct 29 04:40:19.392452 kubelet[1638]: I1029 04:40:19.392378 1638 state_mem.go:35] "Initializing new in-memory state store" Oct 29 04:40:19.394000 audit[1664]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=1664 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 04:40:19.394000 audit[1664]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffdd908aa40 a2=0 a3=7ffdd908aa2c items=0 ppid=1638 pid=1664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:19.394000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Oct 29 04:40:19.398209 kubelet[1638]: I1029 04:40:19.398175 1638 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Oct 29 04:40:19.399300 kubelet[1638]: I1029 04:40:19.399273 1638 status_manager.go:227] "Starting to sync pod status with apiserver" Oct 29 04:40:19.399492 kubelet[1638]: I1029 04:40:19.399466 1638 watchdog_linux.go:127] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." Oct 29 04:40:19.399633 kubelet[1638]: I1029 04:40:19.399594 1638 kubelet.go:2382] "Starting kubelet main sync loop" Oct 29 04:40:19.399911 kubelet[1638]: E1029 04:40:19.399880 1638 kubelet.go:2406] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Oct 29 04:40:19.407000 audit[1665]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=1665 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 04:40:19.407000 audit[1665]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffc4157290 a2=0 a3=7fffc415727c items=0 ppid=1638 pid=1665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:19.407000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Oct 29 04:40:19.411025 systemd[1]: Created slice kubepods.slice. Oct 29 04:40:19.412761 kubelet[1638]: W1029 04:40:19.412721 1638 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.230.43.230:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.230.43.230:6443: connect: connection refused Oct 29 04:40:19.412905 kubelet[1638]: E1029 04:40:19.412798 1638 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://10.230.43.230:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 10.230.43.230:6443: connect: connection refused" logger="UnhandledError" Oct 29 04:40:19.414000 audit[1667]: NETFILTER_CFG table=mangle:33 family=10 entries=1 op=nft_register_chain pid=1667 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 04:40:19.414000 audit[1667]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc8ee16980 a2=0 a3=7ffc8ee1696c items=0 ppid=1638 pid=1667 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:19.414000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Oct 29 04:40:19.418000 audit[1669]: NETFILTER_CFG table=nat:34 family=10 entries=2 op=nft_register_chain pid=1669 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 04:40:19.418000 audit[1669]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffc6a32b750 a2=0 a3=7ffc6a32b73c items=0 ppid=1638 pid=1669 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:19.418000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Oct 29 04:40:19.422100 systemd[1]: Created slice kubepods-burstable.slice. Oct 29 04:40:19.423000 audit[1668]: NETFILTER_CFG table=nat:35 family=2 entries=1 op=nft_register_chain pid=1668 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 04:40:19.423000 audit[1668]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe24f5f0c0 a2=0 a3=7ffe24f5f0ac items=0 ppid=1638 pid=1668 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:19.423000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Oct 29 04:40:19.426954 systemd[1]: Created slice kubepods-besteffort.slice. Oct 29 04:40:19.427000 audit[1670]: NETFILTER_CFG table=filter:36 family=10 entries=2 op=nft_register_chain pid=1670 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 04:40:19.427000 audit[1670]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc3c890b10 a2=0 a3=7ffc3c890afc items=0 ppid=1638 pid=1670 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:19.427000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Oct 29 04:40:19.428000 audit[1671]: NETFILTER_CFG table=filter:37 family=2 entries=1 op=nft_register_chain pid=1671 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 04:40:19.428000 audit[1671]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffd7c8e090 a2=0 a3=7fffd7c8e07c items=0 ppid=1638 pid=1671 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:19.428000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Oct 29 04:40:19.432182 kubelet[1638]: I1029 04:40:19.432140 1638 manager.go:519] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Oct 29 04:40:19.432000 audit[1638]: AVC avc: denied { mac_admin } for pid=1638 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:19.432000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 29 04:40:19.432000 audit[1638]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000e521b0 a1=c000e4ebb8 a2=c000e52180 a3=25 items=0 ppid=1 pid=1638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:19.432000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 29 04:40:19.433697 kubelet[1638]: I1029 04:40:19.433664 1638 server.go:94] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" Oct 29 04:40:19.434109 kubelet[1638]: I1029 04:40:19.434085 1638 eviction_manager.go:189] "Eviction manager: starting control loop" Oct 29 04:40:19.434524 kubelet[1638]: I1029 04:40:19.434443 1638 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Oct 29 04:40:19.437342 kubelet[1638]: I1029 04:40:19.437317 1638 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Oct 29 04:40:19.438360 kubelet[1638]: E1029 04:40:19.438242 1638 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" Oct 29 04:40:19.438473 kubelet[1638]: E1029 04:40:19.438414 1638 eviction_manager.go:292] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"srv-jtkau.gb1.brightbox.com\" not found" Oct 29 04:40:19.515097 systemd[1]: Created slice kubepods-burstable-pode416a32eced17a63c43b6a5376efe009.slice. Oct 29 04:40:19.528153 kubelet[1638]: E1029 04:40:19.528068 1638 kubelet.go:3190] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"srv-jtkau.gb1.brightbox.com\" not found" node="srv-jtkau.gb1.brightbox.com" Oct 29 04:40:19.532905 systemd[1]: Created slice kubepods-burstable-pod9517140ae410c9485fff58fee34dabe2.slice. Oct 29 04:40:19.534234 kubelet[1638]: W1029 04:40:19.534202 1638 helpers.go:245] readString: Failed to read "/sys/fs/cgroup/kubepods.slice/kubepods-burstable.slice/kubepods-burstable-pod9517140ae410c9485fff58fee34dabe2.slice/cpuset.cpus.effective": read /sys/fs/cgroup/kubepods.slice/kubepods-burstable.slice/kubepods-burstable-pod9517140ae410c9485fff58fee34dabe2.slice/cpuset.cpus.effective: no such device Oct 29 04:40:19.539100 kubelet[1638]: E1029 04:40:19.539059 1638 kubelet.go:3190] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"srv-jtkau.gb1.brightbox.com\" not found" node="srv-jtkau.gb1.brightbox.com" Oct 29 04:40:19.541781 kubelet[1638]: I1029 04:40:19.541745 1638 kubelet_node_status.go:75] "Attempting to register node" node="srv-jtkau.gb1.brightbox.com" Oct 29 04:40:19.543178 kubelet[1638]: I1029 04:40:19.543136 1638 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/e416a32eced17a63c43b6a5376efe009-k8s-certs\") pod \"kube-apiserver-srv-jtkau.gb1.brightbox.com\" (UID: \"e416a32eced17a63c43b6a5376efe009\") " pod="kube-system/kube-apiserver-srv-jtkau.gb1.brightbox.com" Oct 29 04:40:19.543277 kubelet[1638]: I1029 04:40:19.543182 1638 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/e416a32eced17a63c43b6a5376efe009-usr-share-ca-certificates\") pod \"kube-apiserver-srv-jtkau.gb1.brightbox.com\" (UID: \"e416a32eced17a63c43b6a5376efe009\") " pod="kube-system/kube-apiserver-srv-jtkau.gb1.brightbox.com" Oct 29 04:40:19.543277 kubelet[1638]: I1029 04:40:19.543217 1638 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/e416a32eced17a63c43b6a5376efe009-ca-certs\") pod \"kube-apiserver-srv-jtkau.gb1.brightbox.com\" (UID: \"e416a32eced17a63c43b6a5376efe009\") " pod="kube-system/kube-apiserver-srv-jtkau.gb1.brightbox.com" Oct 29 04:40:19.543527 kubelet[1638]: E1029 04:40:19.543484 1638 kubelet_node_status.go:107] "Unable to register node with API server" err="Post \"https://10.230.43.230:6443/api/v1/nodes\": dial tcp 10.230.43.230:6443: connect: connection refused" node="srv-jtkau.gb1.brightbox.com" Oct 29 04:40:19.543568 systemd[1]: Created slice kubepods-burstable-pod4c4accd07c0e12839179c296d86df4a0.slice. Oct 29 04:40:19.545872 kubelet[1638]: E1029 04:40:19.545841 1638 kubelet.go:3190] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"srv-jtkau.gb1.brightbox.com\" not found" node="srv-jtkau.gb1.brightbox.com" Oct 29 04:40:19.549394 kubelet[1638]: E1029 04:40:19.549309 1638 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.230.43.230:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/srv-jtkau.gb1.brightbox.com?timeout=10s\": dial tcp 10.230.43.230:6443: connect: connection refused" interval="400ms" Oct 29 04:40:19.644719 kubelet[1638]: I1029 04:40:19.644475 1638 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/9517140ae410c9485fff58fee34dabe2-ca-certs\") pod \"kube-controller-manager-srv-jtkau.gb1.brightbox.com\" (UID: \"9517140ae410c9485fff58fee34dabe2\") " pod="kube-system/kube-controller-manager-srv-jtkau.gb1.brightbox.com" Oct 29 04:40:19.645014 kubelet[1638]: I1029 04:40:19.644857 1638 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/9517140ae410c9485fff58fee34dabe2-kubeconfig\") pod \"kube-controller-manager-srv-jtkau.gb1.brightbox.com\" (UID: \"9517140ae410c9485fff58fee34dabe2\") " pod="kube-system/kube-controller-manager-srv-jtkau.gb1.brightbox.com" Oct 29 04:40:19.645014 kubelet[1638]: I1029 04:40:19.644925 1638 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/9517140ae410c9485fff58fee34dabe2-usr-share-ca-certificates\") pod \"kube-controller-manager-srv-jtkau.gb1.brightbox.com\" (UID: \"9517140ae410c9485fff58fee34dabe2\") " pod="kube-system/kube-controller-manager-srv-jtkau.gb1.brightbox.com" Oct 29 04:40:19.645014 kubelet[1638]: I1029 04:40:19.644998 1638 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/4c4accd07c0e12839179c296d86df4a0-kubeconfig\") pod \"kube-scheduler-srv-jtkau.gb1.brightbox.com\" (UID: \"4c4accd07c0e12839179c296d86df4a0\") " pod="kube-system/kube-scheduler-srv-jtkau.gb1.brightbox.com" Oct 29 04:40:19.645230 kubelet[1638]: I1029 04:40:19.645086 1638 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/9517140ae410c9485fff58fee34dabe2-flexvolume-dir\") pod \"kube-controller-manager-srv-jtkau.gb1.brightbox.com\" (UID: \"9517140ae410c9485fff58fee34dabe2\") " pod="kube-system/kube-controller-manager-srv-jtkau.gb1.brightbox.com" Oct 29 04:40:19.645319 kubelet[1638]: I1029 04:40:19.645114 1638 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/9517140ae410c9485fff58fee34dabe2-k8s-certs\") pod \"kube-controller-manager-srv-jtkau.gb1.brightbox.com\" (UID: \"9517140ae410c9485fff58fee34dabe2\") " pod="kube-system/kube-controller-manager-srv-jtkau.gb1.brightbox.com" Oct 29 04:40:19.748244 kubelet[1638]: I1029 04:40:19.748186 1638 kubelet_node_status.go:75] "Attempting to register node" node="srv-jtkau.gb1.brightbox.com" Oct 29 04:40:19.748857 kubelet[1638]: E1029 04:40:19.748798 1638 kubelet_node_status.go:107] "Unable to register node with API server" err="Post \"https://10.230.43.230:6443/api/v1/nodes\": dial tcp 10.230.43.230:6443: connect: connection refused" node="srv-jtkau.gb1.brightbox.com" Oct 29 04:40:19.833489 env[1204]: time="2025-10-29T04:40:19.832321911Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-srv-jtkau.gb1.brightbox.com,Uid:e416a32eced17a63c43b6a5376efe009,Namespace:kube-system,Attempt:0,}" Oct 29 04:40:19.841483 env[1204]: time="2025-10-29T04:40:19.841430221Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-srv-jtkau.gb1.brightbox.com,Uid:9517140ae410c9485fff58fee34dabe2,Namespace:kube-system,Attempt:0,}" Oct 29 04:40:19.848029 env[1204]: time="2025-10-29T04:40:19.847948608Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-srv-jtkau.gb1.brightbox.com,Uid:4c4accd07c0e12839179c296d86df4a0,Namespace:kube-system,Attempt:0,}" Oct 29 04:40:19.951055 kubelet[1638]: E1029 04:40:19.950959 1638 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.230.43.230:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/srv-jtkau.gb1.brightbox.com?timeout=10s\": dial tcp 10.230.43.230:6443: connect: connection refused" interval="800ms" Oct 29 04:40:20.143027 kubelet[1638]: W1029 04:40:20.142916 1638 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.230.43.230:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 10.230.43.230:6443: connect: connection refused Oct 29 04:40:20.143027 kubelet[1638]: E1029 04:40:20.142996 1638 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://10.230.43.230:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 10.230.43.230:6443: connect: connection refused" logger="UnhandledError" Oct 29 04:40:20.152516 kubelet[1638]: I1029 04:40:20.152473 1638 kubelet_node_status.go:75] "Attempting to register node" node="srv-jtkau.gb1.brightbox.com" Oct 29 04:40:20.152992 kubelet[1638]: E1029 04:40:20.152917 1638 kubelet_node_status.go:107] "Unable to register node with API server" err="Post \"https://10.230.43.230:6443/api/v1/nodes\": dial tcp 10.230.43.230:6443: connect: connection refused" node="srv-jtkau.gb1.brightbox.com" Oct 29 04:40:20.333105 kubelet[1638]: W1029 04:40:20.329735 1638 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.230.43.230:6443/api/v1/nodes?fieldSelector=metadata.name%3Dsrv-jtkau.gb1.brightbox.com&limit=500&resourceVersion=0": dial tcp 10.230.43.230:6443: connect: connection refused Oct 29 04:40:20.333105 kubelet[1638]: E1029 04:40:20.329820 1638 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://10.230.43.230:6443/api/v1/nodes?fieldSelector=metadata.name%3Dsrv-jtkau.gb1.brightbox.com&limit=500&resourceVersion=0\": dial tcp 10.230.43.230:6443: connect: connection refused" logger="UnhandledError" Oct 29 04:40:20.537276 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3155117512.mount: Deactivated successfully. Oct 29 04:40:20.543383 env[1204]: time="2025-10-29T04:40:20.543288546Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 04:40:20.545825 env[1204]: time="2025-10-29T04:40:20.545786575Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 04:40:20.550190 env[1204]: time="2025-10-29T04:40:20.550152441Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 04:40:20.553938 env[1204]: time="2025-10-29T04:40:20.553701088Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 04:40:20.555153 env[1204]: time="2025-10-29T04:40:20.555093345Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 04:40:20.561565 env[1204]: time="2025-10-29T04:40:20.561488103Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 04:40:20.565224 env[1204]: time="2025-10-29T04:40:20.565161106Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 04:40:20.566721 env[1204]: time="2025-10-29T04:40:20.566659951Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 04:40:20.567651 env[1204]: time="2025-10-29T04:40:20.567594995Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 04:40:20.571997 env[1204]: time="2025-10-29T04:40:20.571953564Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 04:40:20.573917 env[1204]: time="2025-10-29T04:40:20.573840931Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 04:40:20.575340 env[1204]: time="2025-10-29T04:40:20.575300572Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 04:40:20.626513 env[1204]: time="2025-10-29T04:40:20.626251744Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 29 04:40:20.626815 env[1204]: time="2025-10-29T04:40:20.626548172Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 29 04:40:20.626916 env[1204]: time="2025-10-29T04:40:20.626781360Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 29 04:40:20.627456 env[1204]: time="2025-10-29T04:40:20.627369037Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5cd28dd09ec935b7ba265ed8567323912b9eb45e38f5a249e456aa174b1ed675 pid=1689 runtime=io.containerd.runc.v2 Oct 29 04:40:20.630640 env[1204]: time="2025-10-29T04:40:20.630518289Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 29 04:40:20.630760 env[1204]: time="2025-10-29T04:40:20.630671417Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 29 04:40:20.630834 env[1204]: time="2025-10-29T04:40:20.630763961Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 29 04:40:20.631307 env[1204]: time="2025-10-29T04:40:20.631144159Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a74fa9bed2b65bd4306afbdf133fdd2e68ed1f7da2e59cfcf037849a4c3e6544 pid=1691 runtime=io.containerd.runc.v2 Oct 29 04:40:20.654641 env[1204]: time="2025-10-29T04:40:20.654468831Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 29 04:40:20.654641 env[1204]: time="2025-10-29T04:40:20.654559020Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 29 04:40:20.654641 env[1204]: time="2025-10-29T04:40:20.654577987Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 29 04:40:20.657099 env[1204]: time="2025-10-29T04:40:20.656973290Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3f580523db92bd2fa22af988b647541f0302eb6aa3ead2cd41b59d3266aa1780 pid=1710 runtime=io.containerd.runc.v2 Oct 29 04:40:20.671949 systemd[1]: Started cri-containerd-5cd28dd09ec935b7ba265ed8567323912b9eb45e38f5a249e456aa174b1ed675.scope. Oct 29 04:40:20.684081 systemd[1]: Started cri-containerd-a74fa9bed2b65bd4306afbdf133fdd2e68ed1f7da2e59cfcf037849a4c3e6544.scope. Oct 29 04:40:20.697939 kubelet[1638]: W1029 04:40:20.697769 1638 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.230.43.230:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.230.43.230:6443: connect: connection refused Oct 29 04:40:20.698173 kubelet[1638]: E1029 04:40:20.697946 1638 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://10.230.43.230:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 10.230.43.230:6443: connect: connection refused" logger="UnhandledError" Oct 29 04:40:20.729000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:20.729000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:20.729000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:20.729000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:20.729000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:20.729000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:20.729000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:20.729000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:20.729000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:20.730000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:20.730000 audit: BPF prog-id=58 op=LOAD Oct 29 04:40:20.732000 audit[1714]: AVC avc: denied { bpf } for pid=1714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:20.732000 audit[1714]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=1689 pid=1714 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:20.732000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563643238646430396563393335623762613236356564383536373332 Oct 29 04:40:20.733000 audit[1714]: AVC avc: denied { perfmon } for pid=1714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:20.733000 audit[1714]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=1689 pid=1714 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:20.733000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563643238646430396563393335623762613236356564383536373332 Oct 29 04:40:20.733000 audit[1714]: AVC avc: denied { bpf } for pid=1714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:20.733000 audit[1714]: AVC avc: denied { bpf } for pid=1714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:20.733000 audit[1714]: AVC avc: denied { bpf } for pid=1714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:20.733000 audit[1714]: AVC avc: denied { perfmon } for pid=1714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:20.733000 audit[1714]: AVC avc: denied { perfmon } for pid=1714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:20.733000 audit[1714]: AVC avc: denied { perfmon } for pid=1714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:20.733000 audit[1714]: AVC avc: denied { perfmon } for pid=1714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:20.733000 audit[1714]: AVC avc: denied { perfmon } for pid=1714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:20.733000 audit[1714]: AVC avc: denied { bpf } for pid=1714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:20.733000 audit[1714]: AVC avc: denied { bpf } for pid=1714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:20.733000 audit: BPF prog-id=59 op=LOAD Oct 29 04:40:20.733000 audit[1714]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0001c9ff0 items=0 ppid=1689 pid=1714 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:20.733000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563643238646430396563393335623762613236356564383536373332 Oct 29 04:40:20.735000 audit[1714]: AVC avc: denied { bpf } for pid=1714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:20.735000 audit[1714]: AVC avc: denied { bpf } for pid=1714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:20.735000 audit[1714]: AVC avc: denied { perfmon } for pid=1714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:20.735000 audit[1714]: AVC avc: denied { perfmon } for pid=1714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:20.735000 audit[1714]: AVC avc: denied { perfmon } for pid=1714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:20.735000 audit[1714]: AVC avc: denied { perfmon } for pid=1714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:20.735000 audit[1714]: AVC avc: denied { perfmon } for pid=1714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:20.735000 audit[1714]: AVC avc: denied { bpf } for pid=1714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:20.735000 audit[1714]: AVC avc: denied { bpf } for pid=1714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:20.735000 audit: BPF prog-id=60 op=LOAD Oct 29 04:40:20.735000 audit[1714]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0001f6038 items=0 ppid=1689 pid=1714 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:20.735000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563643238646430396563393335623762613236356564383536373332 Oct 29 04:40:20.737000 audit: BPF prog-id=60 op=UNLOAD Oct 29 04:40:20.737000 audit: BPF prog-id=59 op=UNLOAD Oct 29 04:40:20.737000 audit[1714]: AVC avc: denied { bpf } for pid=1714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:20.737000 audit[1714]: AVC avc: denied { bpf } for pid=1714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:20.737000 audit[1714]: AVC avc: denied { bpf } for pid=1714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:20.737000 audit[1714]: AVC avc: denied { perfmon } for pid=1714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:20.737000 audit[1714]: AVC avc: denied { perfmon } for pid=1714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:20.737000 audit[1714]: AVC avc: denied { perfmon } for pid=1714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:20.737000 audit[1714]: AVC avc: denied { perfmon } for pid=1714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:20.737000 audit[1714]: AVC avc: denied { perfmon } for pid=1714 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:20.737000 audit[1714]: AVC avc: denied { bpf } for pid=1714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:20.737000 audit[1714]: AVC avc: denied { bpf } for pid=1714 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:20.737000 audit: BPF prog-id=61 op=LOAD Oct 29 04:40:20.737000 audit[1714]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0001f6448 items=0 ppid=1689 pid=1714 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:20.737000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563643238646430396563393335623762613236356564383536373332 Oct 29 04:40:20.754035 kubelet[1638]: E1029 04:40:20.753910 1638 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.230.43.230:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/srv-jtkau.gb1.brightbox.com?timeout=10s\": dial tcp 10.230.43.230:6443: connect: connection refused" interval="1.6s" Oct 29 04:40:20.769199 systemd[1]: Started cri-containerd-3f580523db92bd2fa22af988b647541f0302eb6aa3ead2cd41b59d3266aa1780.scope. Oct 29 04:40:20.790000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:20.790000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:20.791000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:20.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:20.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:20.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:20.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:20.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:20.791000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:20.792000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:20.792000 audit: BPF prog-id=62 op=LOAD Oct 29 04:40:20.793000 audit[1715]: AVC avc: denied { bpf } for pid=1715 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:20.793000 audit[1715]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1691 pid=1715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:20.793000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137346661396265643262363562643433303661666264663133336664 Oct 29 04:40:20.794000 audit[1715]: AVC avc: denied { perfmon } for pid=1715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:20.794000 audit[1715]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1691 pid=1715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:20.794000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137346661396265643262363562643433303661666264663133336664 Oct 29 04:40:20.795000 audit[1715]: AVC avc: denied { bpf } for pid=1715 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:20.795000 audit[1715]: AVC avc: denied { bpf } for pid=1715 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:20.795000 audit[1715]: AVC avc: denied { bpf } for pid=1715 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:20.795000 audit[1715]: AVC avc: denied { perfmon } for pid=1715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:20.795000 audit[1715]: AVC avc: denied { perfmon } for pid=1715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:20.795000 audit[1715]: AVC avc: denied { perfmon } for pid=1715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:20.795000 audit[1715]: AVC avc: denied { perfmon } for pid=1715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:20.795000 audit[1715]: AVC avc: denied { perfmon } for pid=1715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:20.795000 audit[1715]: AVC avc: denied { bpf } for pid=1715 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:20.795000 audit[1715]: AVC avc: denied { bpf } for pid=1715 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:20.795000 audit: BPF prog-id=63 op=LOAD Oct 29 04:40:20.795000 audit[1715]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000025010 items=0 ppid=1691 pid=1715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:20.795000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137346661396265643262363562643433303661666264663133336664 Oct 29 04:40:20.796000 audit[1715]: AVC avc: denied { bpf } for pid=1715 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:20.796000 audit[1715]: AVC avc: denied { bpf } for pid=1715 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:20.796000 audit[1715]: AVC avc: denied { perfmon } for pid=1715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:20.796000 audit[1715]: AVC avc: denied { perfmon } for pid=1715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:20.796000 audit[1715]: AVC avc: denied { perfmon } for pid=1715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:20.796000 audit[1715]: AVC avc: denied { perfmon } for pid=1715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:20.796000 audit[1715]: AVC avc: denied { perfmon } for pid=1715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:20.796000 audit[1715]: AVC avc: denied { bpf } for pid=1715 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:20.796000 audit[1715]: AVC avc: denied { bpf } for pid=1715 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:20.796000 audit: BPF prog-id=64 op=LOAD Oct 29 04:40:20.796000 audit[1715]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000025058 items=0 ppid=1691 pid=1715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:20.796000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137346661396265643262363562643433303661666264663133336664 Oct 29 04:40:20.797000 audit: BPF prog-id=64 op=UNLOAD Oct 29 04:40:20.797000 audit: BPF prog-id=63 op=UNLOAD Oct 29 04:40:20.797000 audit[1715]: AVC avc: denied { bpf } for pid=1715 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:20.797000 audit[1715]: AVC avc: denied { bpf } for pid=1715 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:20.797000 audit[1715]: AVC avc: denied { bpf } for pid=1715 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:20.797000 audit[1715]: AVC avc: denied { perfmon } for pid=1715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:20.797000 audit[1715]: AVC avc: denied { perfmon } for pid=1715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:20.797000 audit[1715]: AVC avc: denied { perfmon } for pid=1715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:20.797000 audit[1715]: AVC avc: denied { perfmon } for pid=1715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:20.797000 audit[1715]: AVC avc: denied { perfmon } for pid=1715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:20.797000 audit[1715]: AVC avc: denied { bpf } for pid=1715 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:20.797000 audit[1715]: AVC avc: denied { bpf } for pid=1715 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:20.797000 audit: BPF prog-id=65 op=LOAD Oct 29 04:40:20.797000 audit[1715]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000025468 items=0 ppid=1691 pid=1715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:20.797000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137346661396265643262363562643433303661666264663133336664 Oct 29 04:40:20.861968 env[1204]: time="2025-10-29T04:40:20.861898309Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-srv-jtkau.gb1.brightbox.com,Uid:e416a32eced17a63c43b6a5376efe009,Namespace:kube-system,Attempt:0,} returns sandbox id \"5cd28dd09ec935b7ba265ed8567323912b9eb45e38f5a249e456aa174b1ed675\"" Oct 29 04:40:20.869587 env[1204]: time="2025-10-29T04:40:20.869527572Z" level=info msg="CreateContainer within sandbox \"5cd28dd09ec935b7ba265ed8567323912b9eb45e38f5a249e456aa174b1ed675\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Oct 29 04:40:20.875000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:20.875000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:20.875000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:20.875000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:20.875000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:20.875000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:20.875000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:20.875000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:20.875000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:20.875000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:20.875000 audit: BPF prog-id=66 op=LOAD Oct 29 04:40:20.879427 kubelet[1638]: W1029 04:40:20.878361 1638 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.230.43.230:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.230.43.230:6443: connect: connection refused Oct 29 04:40:20.879427 kubelet[1638]: E1029 04:40:20.878472 1638 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://10.230.43.230:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 10.230.43.230:6443: connect: connection refused" logger="UnhandledError" Oct 29 04:40:20.878000 audit[1741]: AVC avc: denied { bpf } for pid=1741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:20.878000 audit[1741]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1710 pid=1741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:20.878000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366353830353233646239326264326661323261663938386236343735 Oct 29 04:40:20.878000 audit[1741]: AVC avc: denied { perfmon } for pid=1741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:20.878000 audit[1741]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1710 pid=1741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:20.878000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366353830353233646239326264326661323261663938386236343735 Oct 29 04:40:20.879000 audit[1741]: AVC avc: denied { bpf } for pid=1741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:20.879000 audit[1741]: AVC avc: denied { bpf } for pid=1741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:20.879000 audit[1741]: AVC avc: denied { bpf } for pid=1741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:20.879000 audit[1741]: AVC avc: denied { perfmon } for pid=1741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:20.879000 audit[1741]: AVC avc: denied { perfmon } for pid=1741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:20.879000 audit[1741]: AVC avc: denied { perfmon } for pid=1741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:20.879000 audit[1741]: AVC avc: denied { perfmon } for pid=1741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:20.879000 audit[1741]: AVC avc: denied { perfmon } for pid=1741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:20.879000 audit[1741]: AVC avc: denied { bpf } for pid=1741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:20.879000 audit[1741]: AVC avc: denied { bpf } for pid=1741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:20.879000 audit: BPF prog-id=67 op=LOAD Oct 29 04:40:20.879000 audit[1741]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003e4900 items=0 ppid=1710 pid=1741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:20.879000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366353830353233646239326264326661323261663938386236343735 Oct 29 04:40:20.880000 audit[1741]: AVC avc: denied { bpf } for pid=1741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:20.880000 audit[1741]: AVC avc: denied { bpf } for pid=1741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:20.880000 audit[1741]: AVC avc: denied { perfmon } for pid=1741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:20.880000 audit[1741]: AVC avc: denied { perfmon } for pid=1741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:20.880000 audit[1741]: AVC avc: denied { perfmon } for pid=1741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:20.880000 audit[1741]: AVC avc: denied { perfmon } for pid=1741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:20.880000 audit[1741]: AVC avc: denied { perfmon } for pid=1741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:20.880000 audit[1741]: AVC avc: denied { bpf } for pid=1741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:20.880000 audit[1741]: AVC avc: denied { bpf } for pid=1741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:20.880000 audit: BPF prog-id=68 op=LOAD Oct 29 04:40:20.880000 audit[1741]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003e4948 items=0 ppid=1710 pid=1741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:20.880000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366353830353233646239326264326661323261663938386236343735 Oct 29 04:40:20.881000 audit: BPF prog-id=68 op=UNLOAD Oct 29 04:40:20.881000 audit: BPF prog-id=67 op=UNLOAD Oct 29 04:40:20.881000 audit[1741]: AVC avc: denied { bpf } for pid=1741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:20.881000 audit[1741]: AVC avc: denied { bpf } for pid=1741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:20.881000 audit[1741]: AVC avc: denied { bpf } for pid=1741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:20.881000 audit[1741]: AVC avc: denied { perfmon } for pid=1741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:20.881000 audit[1741]: AVC avc: denied { perfmon } for pid=1741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:20.881000 audit[1741]: AVC avc: denied { perfmon } for pid=1741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:20.881000 audit[1741]: AVC avc: denied { perfmon } for pid=1741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:20.881000 audit[1741]: AVC avc: denied { perfmon } for pid=1741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:20.881000 audit[1741]: AVC avc: denied { bpf } for pid=1741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:20.881000 audit[1741]: AVC avc: denied { bpf } for pid=1741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:20.881000 audit: BPF prog-id=69 op=LOAD Oct 29 04:40:20.887834 env[1204]: time="2025-10-29T04:40:20.887753853Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-srv-jtkau.gb1.brightbox.com,Uid:4c4accd07c0e12839179c296d86df4a0,Namespace:kube-system,Attempt:0,} returns sandbox id \"a74fa9bed2b65bd4306afbdf133fdd2e68ed1f7da2e59cfcf037849a4c3e6544\"" Oct 29 04:40:20.881000 audit[1741]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003e4d58 items=0 ppid=1710 pid=1741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:20.881000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366353830353233646239326264326661323261663938386236343735 Oct 29 04:40:20.892153 env[1204]: time="2025-10-29T04:40:20.892109716Z" level=info msg="CreateContainer within sandbox \"a74fa9bed2b65bd4306afbdf133fdd2e68ed1f7da2e59cfcf037849a4c3e6544\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Oct 29 04:40:20.912345 env[1204]: time="2025-10-29T04:40:20.912237190Z" level=info msg="CreateContainer within sandbox \"5cd28dd09ec935b7ba265ed8567323912b9eb45e38f5a249e456aa174b1ed675\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"61a89cae9515fff736d4a43940d8897a3def8a9fea61d5a5a03809ef21667990\"" Oct 29 04:40:20.913829 env[1204]: time="2025-10-29T04:40:20.913793469Z" level=info msg="StartContainer for \"61a89cae9515fff736d4a43940d8897a3def8a9fea61d5a5a03809ef21667990\"" Oct 29 04:40:20.922708 env[1204]: time="2025-10-29T04:40:20.921728678Z" level=info msg="CreateContainer within sandbox \"a74fa9bed2b65bd4306afbdf133fdd2e68ed1f7da2e59cfcf037849a4c3e6544\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"d5bac75d7c8ebcdfc06f669cba81f354cdac310408fada3174dc87adbf08abf3\"" Oct 29 04:40:20.922708 env[1204]: time="2025-10-29T04:40:20.922639400Z" level=info msg="StartContainer for \"d5bac75d7c8ebcdfc06f669cba81f354cdac310408fada3174dc87adbf08abf3\"" Oct 29 04:40:20.939558 env[1204]: time="2025-10-29T04:40:20.939468065Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-srv-jtkau.gb1.brightbox.com,Uid:9517140ae410c9485fff58fee34dabe2,Namespace:kube-system,Attempt:0,} returns sandbox id \"3f580523db92bd2fa22af988b647541f0302eb6aa3ead2cd41b59d3266aa1780\"" Oct 29 04:40:20.944783 env[1204]: time="2025-10-29T04:40:20.944727766Z" level=info msg="CreateContainer within sandbox \"3f580523db92bd2fa22af988b647541f0302eb6aa3ead2cd41b59d3266aa1780\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Oct 29 04:40:20.957832 kubelet[1638]: I1029 04:40:20.957249 1638 kubelet_node_status.go:75] "Attempting to register node" node="srv-jtkau.gb1.brightbox.com" Oct 29 04:40:20.957832 kubelet[1638]: E1029 04:40:20.957781 1638 kubelet_node_status.go:107] "Unable to register node with API server" err="Post \"https://10.230.43.230:6443/api/v1/nodes\": dial tcp 10.230.43.230:6443: connect: connection refused" node="srv-jtkau.gb1.brightbox.com" Oct 29 04:40:20.969355 systemd[1]: Started cri-containerd-61a89cae9515fff736d4a43940d8897a3def8a9fea61d5a5a03809ef21667990.scope. Oct 29 04:40:20.979422 env[1204]: time="2025-10-29T04:40:20.979349286Z" level=info msg="CreateContainer within sandbox \"3f580523db92bd2fa22af988b647541f0302eb6aa3ead2cd41b59d3266aa1780\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"b2a29527d4bd751501e01813e295236fd8b3383c6e76dc94cf5cb6c4cbdb8b49\"" Oct 29 04:40:20.980363 env[1204]: time="2025-10-29T04:40:20.980330223Z" level=info msg="StartContainer for \"b2a29527d4bd751501e01813e295236fd8b3383c6e76dc94cf5cb6c4cbdb8b49\"" Oct 29 04:40:20.990733 systemd[1]: Started cri-containerd-d5bac75d7c8ebcdfc06f669cba81f354cdac310408fada3174dc87adbf08abf3.scope. Oct 29 04:40:21.006000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:21.006000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:21.006000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:21.006000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:21.006000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:21.006000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:21.006000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:21.006000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:21.006000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:21.007000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:21.007000 audit: BPF prog-id=70 op=LOAD Oct 29 04:40:21.009000 audit[1813]: AVC avc: denied { bpf } for pid=1813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:21.009000 audit[1813]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=1689 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:21.009000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631613839636165393531356666663733366434613433393430643838 Oct 29 04:40:21.009000 audit[1813]: AVC avc: denied { perfmon } for pid=1813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:21.009000 audit[1813]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=1689 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:21.009000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631613839636165393531356666663733366434613433393430643838 Oct 29 04:40:21.009000 audit[1813]: AVC avc: denied { bpf } for pid=1813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:21.009000 audit[1813]: AVC avc: denied { bpf } for pid=1813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:21.009000 audit[1813]: AVC avc: denied { bpf } for pid=1813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:21.009000 audit[1813]: AVC avc: denied { perfmon } for pid=1813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:21.009000 audit[1813]: AVC avc: denied { perfmon } for pid=1813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:21.009000 audit[1813]: AVC avc: denied { perfmon } for pid=1813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:21.009000 audit[1813]: AVC avc: denied { perfmon } for pid=1813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:21.009000 audit[1813]: AVC avc: denied { perfmon } for pid=1813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:21.009000 audit[1813]: AVC avc: denied { bpf } for pid=1813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:21.009000 audit[1813]: AVC avc: denied { bpf } for pid=1813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:21.009000 audit: BPF prog-id=71 op=LOAD Oct 29 04:40:21.009000 audit[1813]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c000380500 items=0 ppid=1689 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:21.009000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631613839636165393531356666663733366434613433393430643838 Oct 29 04:40:21.009000 audit[1813]: AVC avc: denied { bpf } for pid=1813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:21.009000 audit[1813]: AVC avc: denied { bpf } for pid=1813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:21.009000 audit[1813]: AVC avc: denied { perfmon } for pid=1813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:21.009000 audit[1813]: AVC avc: denied { perfmon } for pid=1813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:21.009000 audit[1813]: AVC avc: denied { perfmon } for pid=1813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:21.009000 audit[1813]: AVC avc: denied { perfmon } for pid=1813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:21.009000 audit[1813]: AVC avc: denied { perfmon } for pid=1813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:21.009000 audit[1813]: AVC avc: denied { bpf } for pid=1813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:21.009000 audit[1813]: AVC avc: denied { bpf } for pid=1813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:21.009000 audit: BPF prog-id=72 op=LOAD Oct 29 04:40:21.009000 audit[1813]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c000380548 items=0 ppid=1689 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:21.009000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631613839636165393531356666663733366434613433393430643838 Oct 29 04:40:21.009000 audit: BPF prog-id=72 op=UNLOAD Oct 29 04:40:21.009000 audit: BPF prog-id=71 op=UNLOAD Oct 29 04:40:21.009000 audit[1813]: AVC avc: denied { bpf } for pid=1813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:21.009000 audit[1813]: AVC avc: denied { bpf } for pid=1813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:21.009000 audit[1813]: AVC avc: denied { bpf } for pid=1813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:21.009000 audit[1813]: AVC avc: denied { perfmon } for pid=1813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:21.009000 audit[1813]: AVC avc: denied { perfmon } for pid=1813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:21.009000 audit[1813]: AVC avc: denied { perfmon } for pid=1813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:21.009000 audit[1813]: AVC avc: denied { perfmon } for pid=1813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:21.009000 audit[1813]: AVC avc: denied { perfmon } for pid=1813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:21.009000 audit[1813]: AVC avc: denied { bpf } for pid=1813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:21.009000 audit[1813]: AVC avc: denied { bpf } for pid=1813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:21.009000 audit: BPF prog-id=73 op=LOAD Oct 29 04:40:21.009000 audit[1813]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c000380958 items=0 ppid=1689 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:21.009000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631613839636165393531356666663733366434613433393430643838 Oct 29 04:40:21.029947 systemd[1]: Started cri-containerd-b2a29527d4bd751501e01813e295236fd8b3383c6e76dc94cf5cb6c4cbdb8b49.scope. Oct 29 04:40:21.066000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:21.066000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:21.066000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:21.066000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:21.066000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:21.066000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:21.066000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:21.066000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:21.066000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:21.066000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:21.066000 audit: BPF prog-id=74 op=LOAD Oct 29 04:40:21.074000 audit[1814]: AVC avc: denied { bpf } for pid=1814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:21.074000 audit[1814]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1691 pid=1814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:21.074000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435626163373564376338656263646663303666363639636261383166 Oct 29 04:40:21.074000 audit[1814]: AVC avc: denied { perfmon } for pid=1814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:21.074000 audit[1814]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1691 pid=1814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:21.074000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435626163373564376338656263646663303666363639636261383166 Oct 29 04:40:21.077000 audit[1814]: AVC avc: denied { bpf } for pid=1814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:21.077000 audit[1814]: AVC avc: denied { bpf } for pid=1814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:21.077000 audit[1814]: AVC avc: denied { bpf } for pid=1814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:21.077000 audit[1814]: AVC avc: denied { perfmon } for pid=1814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:21.077000 audit[1814]: AVC avc: denied { perfmon } for pid=1814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:21.077000 audit[1814]: AVC avc: denied { perfmon } for pid=1814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:21.077000 audit[1814]: AVC avc: denied { perfmon } for pid=1814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:21.077000 audit[1814]: AVC avc: denied { perfmon } for pid=1814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:21.077000 audit[1814]: AVC avc: denied { bpf } for pid=1814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:21.077000 audit[1814]: AVC avc: denied { bpf } for pid=1814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:21.077000 audit: BPF prog-id=75 op=LOAD Oct 29 04:40:21.077000 audit[1814]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000025200 items=0 ppid=1691 pid=1814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:21.077000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435626163373564376338656263646663303666363639636261383166 Oct 29 04:40:21.077000 audit[1814]: AVC avc: denied { bpf } for pid=1814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:21.077000 audit[1814]: AVC avc: denied { bpf } for pid=1814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:21.077000 audit[1814]: AVC avc: denied { perfmon } for pid=1814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:21.077000 audit[1814]: AVC avc: denied { perfmon } for pid=1814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:21.077000 audit[1814]: AVC avc: denied { perfmon } for pid=1814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:21.077000 audit[1814]: AVC avc: denied { perfmon } for pid=1814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:21.077000 audit[1814]: AVC avc: denied { perfmon } for pid=1814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:21.077000 audit[1814]: AVC avc: denied { bpf } for pid=1814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:21.077000 audit[1814]: AVC avc: denied { bpf } for pid=1814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:21.077000 audit: BPF prog-id=76 op=LOAD Oct 29 04:40:21.077000 audit[1814]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000025248 items=0 ppid=1691 pid=1814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:21.077000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435626163373564376338656263646663303666363639636261383166 Oct 29 04:40:21.077000 audit: BPF prog-id=76 op=UNLOAD Oct 29 04:40:21.077000 audit: BPF prog-id=75 op=UNLOAD Oct 29 04:40:21.077000 audit[1814]: AVC avc: denied { bpf } for pid=1814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:21.077000 audit[1814]: AVC avc: denied { bpf } for pid=1814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:21.077000 audit[1814]: AVC avc: denied { bpf } for pid=1814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:21.077000 audit[1814]: AVC avc: denied { perfmon } for pid=1814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:21.077000 audit[1814]: AVC avc: denied { perfmon } for pid=1814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:21.077000 audit[1814]: AVC avc: denied { perfmon } for pid=1814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:21.077000 audit[1814]: AVC avc: denied { perfmon } for pid=1814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:21.077000 audit[1814]: AVC avc: denied { perfmon } for pid=1814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:21.077000 audit[1814]: AVC avc: denied { bpf } for pid=1814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:21.077000 audit[1814]: AVC avc: denied { bpf } for pid=1814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:21.077000 audit: BPF prog-id=77 op=LOAD Oct 29 04:40:21.077000 audit[1814]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000025658 items=0 ppid=1691 pid=1814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:21.077000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435626163373564376338656263646663303666363639636261383166 Oct 29 04:40:21.086000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:21.086000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:21.086000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:21.086000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:21.086000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:21.086000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:21.086000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:21.086000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:21.086000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:21.086000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:21.086000 audit: BPF prog-id=78 op=LOAD Oct 29 04:40:21.088000 audit[1845]: AVC avc: denied { bpf } for pid=1845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:21.088000 audit[1845]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1710 pid=1845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:21.088000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232613239353237643462643735313530316530313831336532393532 Oct 29 04:40:21.088000 audit[1845]: AVC avc: denied { perfmon } for pid=1845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:21.088000 audit[1845]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1710 pid=1845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:21.088000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232613239353237643462643735313530316530313831336532393532 Oct 29 04:40:21.089000 audit[1845]: AVC avc: denied { bpf } for pid=1845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:21.089000 audit[1845]: AVC avc: denied { bpf } for pid=1845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:21.089000 audit[1845]: AVC avc: denied { bpf } for pid=1845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:21.089000 audit[1845]: AVC avc: denied { perfmon } for pid=1845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:21.089000 audit[1845]: AVC avc: denied { perfmon } for pid=1845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:21.089000 audit[1845]: AVC avc: denied { perfmon } for pid=1845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:21.089000 audit[1845]: AVC avc: denied { perfmon } for pid=1845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:21.089000 audit[1845]: AVC avc: denied { perfmon } for pid=1845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:21.089000 audit[1845]: AVC avc: denied { bpf } for pid=1845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:21.089000 audit[1845]: AVC avc: denied { bpf } for pid=1845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:21.089000 audit: BPF prog-id=79 op=LOAD Oct 29 04:40:21.089000 audit[1845]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001c0560 items=0 ppid=1710 pid=1845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:21.089000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232613239353237643462643735313530316530313831336532393532 Oct 29 04:40:21.090000 audit[1845]: AVC avc: denied { bpf } for pid=1845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:21.090000 audit[1845]: AVC avc: denied { bpf } for pid=1845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:21.090000 audit[1845]: AVC avc: denied { perfmon } for pid=1845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:21.090000 audit[1845]: AVC avc: denied { perfmon } for pid=1845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:21.090000 audit[1845]: AVC avc: denied { perfmon } for pid=1845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:21.090000 audit[1845]: AVC avc: denied { perfmon } for pid=1845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:21.090000 audit[1845]: AVC avc: denied { perfmon } for pid=1845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:21.090000 audit[1845]: AVC avc: denied { bpf } for pid=1845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:21.090000 audit[1845]: AVC avc: denied { bpf } for pid=1845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:21.090000 audit: BPF prog-id=80 op=LOAD Oct 29 04:40:21.090000 audit[1845]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001c05a8 items=0 ppid=1710 pid=1845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:21.090000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232613239353237643462643735313530316530313831336532393532 Oct 29 04:40:21.091000 audit: BPF prog-id=80 op=UNLOAD Oct 29 04:40:21.091000 audit: BPF prog-id=79 op=UNLOAD Oct 29 04:40:21.092000 audit[1845]: AVC avc: denied { bpf } for pid=1845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:21.092000 audit[1845]: AVC avc: denied { bpf } for pid=1845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:21.092000 audit[1845]: AVC avc: denied { bpf } for pid=1845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:21.092000 audit[1845]: AVC avc: denied { perfmon } for pid=1845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:21.092000 audit[1845]: AVC avc: denied { perfmon } for pid=1845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:21.092000 audit[1845]: AVC avc: denied { perfmon } for pid=1845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:21.092000 audit[1845]: AVC avc: denied { perfmon } for pid=1845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:21.092000 audit[1845]: AVC avc: denied { perfmon } for pid=1845 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:21.092000 audit[1845]: AVC avc: denied { bpf } for pid=1845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:21.092000 audit[1845]: AVC avc: denied { bpf } for pid=1845 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:21.092000 audit: BPF prog-id=81 op=LOAD Oct 29 04:40:21.092000 audit[1845]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001c09b8 items=0 ppid=1710 pid=1845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:21.092000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232613239353237643462643735313530316530313831336532393532 Oct 29 04:40:21.099914 env[1204]: time="2025-10-29T04:40:21.099832105Z" level=info msg="StartContainer for \"61a89cae9515fff736d4a43940d8897a3def8a9fea61d5a5a03809ef21667990\" returns successfully" Oct 29 04:40:21.150616 env[1204]: time="2025-10-29T04:40:21.150536265Z" level=info msg="StartContainer for \"d5bac75d7c8ebcdfc06f669cba81f354cdac310408fada3174dc87adbf08abf3\" returns successfully" Oct 29 04:40:21.163062 env[1204]: time="2025-10-29T04:40:21.163006949Z" level=info msg="StartContainer for \"b2a29527d4bd751501e01813e295236fd8b3383c6e76dc94cf5cb6c4cbdb8b49\" returns successfully" Oct 29 04:40:21.338859 kubelet[1638]: E1029 04:40:21.338700 1638 certificate_manager.go:562] "Unhandled Error" err="kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post \"https://10.230.43.230:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 10.230.43.230:6443: connect: connection refused" logger="UnhandledError" Oct 29 04:40:21.425856 kubelet[1638]: E1029 04:40:21.425804 1638 kubelet.go:3190] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"srv-jtkau.gb1.brightbox.com\" not found" node="srv-jtkau.gb1.brightbox.com" Oct 29 04:40:21.433247 kubelet[1638]: E1029 04:40:21.433199 1638 kubelet.go:3190] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"srv-jtkau.gb1.brightbox.com\" not found" node="srv-jtkau.gb1.brightbox.com" Oct 29 04:40:21.435205 kubelet[1638]: E1029 04:40:21.435163 1638 kubelet.go:3190] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"srv-jtkau.gb1.brightbox.com\" not found" node="srv-jtkau.gb1.brightbox.com" Oct 29 04:40:22.438088 kubelet[1638]: E1029 04:40:22.438046 1638 kubelet.go:3190] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"srv-jtkau.gb1.brightbox.com\" not found" node="srv-jtkau.gb1.brightbox.com" Oct 29 04:40:22.439198 kubelet[1638]: E1029 04:40:22.439173 1638 kubelet.go:3190] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"srv-jtkau.gb1.brightbox.com\" not found" node="srv-jtkau.gb1.brightbox.com" Oct 29 04:40:22.561107 kubelet[1638]: I1029 04:40:22.561068 1638 kubelet_node_status.go:75] "Attempting to register node" node="srv-jtkau.gb1.brightbox.com" Oct 29 04:40:23.402371 kernel: kauditd_printk_skb: 572 callbacks suppressed Oct 29 04:40:23.403015 kernel: audit: type=1400 audit(1761712823.390:557): avc: denied { watch } for pid=1862 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526395 scontext=system_u:system_r:svirt_lxc_net_t:s0:c163,c778 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 29 04:40:23.390000 audit[1862]: AVC avc: denied { watch } for pid=1862 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526395 scontext=system_u:system_r:svirt_lxc_net_t:s0:c163,c778 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 29 04:40:23.390000 audit[1862]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c0002ecc60 a2=fc6 a3=0 items=0 ppid=1710 pid=1862 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c163,c778 key=(null) Oct 29 04:40:23.390000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 29 04:40:23.422149 kernel: audit: type=1300 audit(1761712823.390:557): arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c0002ecc60 a2=fc6 a3=0 items=0 ppid=1710 pid=1862 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c163,c778 key=(null) Oct 29 04:40:23.422265 kernel: audit: type=1327 audit(1761712823.390:557): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 29 04:40:23.422324 kernel: audit: type=1400 audit(1761712823.390:558): avc: denied { watch } for pid=1862 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526389 scontext=system_u:system_r:svirt_lxc_net_t:s0:c163,c778 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 29 04:40:23.390000 audit[1862]: AVC avc: denied { watch } for pid=1862 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526389 scontext=system_u:system_r:svirt_lxc_net_t:s0:c163,c778 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 29 04:40:23.428309 kernel: audit: type=1300 audit(1761712823.390:558): arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c0003a2520 a2=fc6 a3=0 items=0 ppid=1710 pid=1862 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c163,c778 key=(null) Oct 29 04:40:23.390000 audit[1862]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c0003a2520 a2=fc6 a3=0 items=0 ppid=1710 pid=1862 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c163,c778 key=(null) Oct 29 04:40:23.390000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 29 04:40:23.442795 kernel: audit: type=1327 audit(1761712823.390:558): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 29 04:40:23.526878 kubelet[1638]: E1029 04:40:23.526790 1638 kubelet.go:3190] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"srv-jtkau.gb1.brightbox.com\" not found" node="srv-jtkau.gb1.brightbox.com" Oct 29 04:40:24.016000 audit[1830]: AVC avc: denied { watch } for pid=1830 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526395 scontext=system_u:system_r:svirt_lxc_net_t:s0:c727,c953 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 29 04:40:24.016000 audit[1830]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=3f a1=c006e385a0 a2=fc6 a3=0 items=0 ppid=1689 pid=1830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c727,c953 key=(null) Oct 29 04:40:24.031737 kernel: audit: type=1400 audit(1761712824.016:559): avc: denied { watch } for pid=1830 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526395 scontext=system_u:system_r:svirt_lxc_net_t:s0:c727,c953 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 29 04:40:24.032085 kernel: audit: type=1300 audit(1761712824.016:559): arch=c000003e syscall=254 success=no exit=-13 a0=3f a1=c006e385a0 a2=fc6 a3=0 items=0 ppid=1689 pid=1830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c727,c953 key=(null) Oct 29 04:40:24.032227 kernel: audit: type=1327 audit(1761712824.016:559): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E34332E323330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 29 04:40:24.016000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E34332E323330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 29 04:40:24.037000 audit[1830]: AVC avc: denied { watch } for pid=1830 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526389 scontext=system_u:system_r:svirt_lxc_net_t:s0:c727,c953 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 29 04:40:24.046634 kernel: audit: type=1400 audit(1761712824.037:560): avc: denied { watch } for pid=1830 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526389 scontext=system_u:system_r:svirt_lxc_net_t:s0:c727,c953 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 29 04:40:24.037000 audit[1830]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c0068fbda0 a2=fc6 a3=0 items=0 ppid=1689 pid=1830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c727,c953 key=(null) Oct 29 04:40:24.037000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E34332E323330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 29 04:40:24.038000 audit[1830]: AVC avc: denied { watch } for pid=1830 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=526391 scontext=system_u:system_r:svirt_lxc_net_t:s0:c727,c953 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 29 04:40:24.038000 audit[1830]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c005b9c810 a2=fc6 a3=0 items=0 ppid=1689 pid=1830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c727,c953 key=(null) Oct 29 04:40:24.038000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E34332E323330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 29 04:40:24.046000 audit[1830]: AVC avc: denied { watch } for pid=1830 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=526397 scontext=system_u:system_r:svirt_lxc_net_t:s0:c727,c953 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 29 04:40:24.046000 audit[1830]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4b a1=c005b9d140 a2=fc6 a3=0 items=0 ppid=1689 pid=1830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c727,c953 key=(null) Oct 29 04:40:24.046000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E34332E323330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 29 04:40:24.047000 audit[1830]: AVC avc: denied { watch } for pid=1830 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526395 scontext=system_u:system_r:svirt_lxc_net_t:s0:c727,c953 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 29 04:40:24.047000 audit[1830]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4b a1=c005b9d170 a2=fc6 a3=0 items=0 ppid=1689 pid=1830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c727,c953 key=(null) Oct 29 04:40:24.047000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E34332E323330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 29 04:40:24.131000 audit[1830]: AVC avc: denied { watch } for pid=1830 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526389 scontext=system_u:system_r:svirt_lxc_net_t:s0:c727,c953 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 29 04:40:24.131000 audit[1830]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c003f22ca0 a2=fc6 a3=0 items=0 ppid=1689 pid=1830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c727,c953 key=(null) Oct 29 04:40:24.131000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E34332E323330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 29 04:40:24.177200 kubelet[1638]: E1029 04:40:24.177142 1638 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"srv-jtkau.gb1.brightbox.com\" not found" node="srv-jtkau.gb1.brightbox.com" Oct 29 04:40:24.265682 kubelet[1638]: I1029 04:40:24.265631 1638 kubelet_node_status.go:78] "Successfully registered node" node="srv-jtkau.gb1.brightbox.com" Oct 29 04:40:24.266045 kubelet[1638]: E1029 04:40:24.265999 1638 kubelet_node_status.go:548] "Error updating node status, will retry" err="error getting node \"srv-jtkau.gb1.brightbox.com\": node \"srv-jtkau.gb1.brightbox.com\" not found" Oct 29 04:40:24.311717 kubelet[1638]: I1029 04:40:24.311527 1638 apiserver.go:52] "Watching apiserver" Oct 29 04:40:24.342162 kubelet[1638]: I1029 04:40:24.342104 1638 kubelet.go:3194] "Creating a mirror pod for static pod" pod="kube-system/kube-apiserver-srv-jtkau.gb1.brightbox.com" Oct 29 04:40:24.342620 kubelet[1638]: I1029 04:40:24.342571 1638 desired_state_of_world_populator.go:158] "Finished populating initial desired state of world" Oct 29 04:40:24.352872 kubelet[1638]: E1029 04:40:24.352822 1638 kubelet.go:3196] "Failed creating a mirror pod" err="pods \"kube-apiserver-srv-jtkau.gb1.brightbox.com\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-apiserver-srv-jtkau.gb1.brightbox.com" Oct 29 04:40:24.353111 kubelet[1638]: I1029 04:40:24.353084 1638 kubelet.go:3194] "Creating a mirror pod for static pod" pod="kube-system/kube-controller-manager-srv-jtkau.gb1.brightbox.com" Oct 29 04:40:24.355551 kubelet[1638]: E1029 04:40:24.355509 1638 kubelet.go:3196] "Failed creating a mirror pod" err="pods \"kube-controller-manager-srv-jtkau.gb1.brightbox.com\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-controller-manager-srv-jtkau.gb1.brightbox.com" Oct 29 04:40:24.355739 kubelet[1638]: I1029 04:40:24.355714 1638 kubelet.go:3194] "Creating a mirror pod for static pod" pod="kube-system/kube-scheduler-srv-jtkau.gb1.brightbox.com" Oct 29 04:40:24.358043 kubelet[1638]: E1029 04:40:24.358001 1638 kubelet.go:3196] "Failed creating a mirror pod" err="pods \"kube-scheduler-srv-jtkau.gb1.brightbox.com\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-scheduler-srv-jtkau.gb1.brightbox.com" Oct 29 04:40:25.693780 kubelet[1638]: I1029 04:40:25.693705 1638 kubelet.go:3194] "Creating a mirror pod for static pod" pod="kube-system/kube-scheduler-srv-jtkau.gb1.brightbox.com" Oct 29 04:40:25.702228 kubelet[1638]: W1029 04:40:25.702185 1638 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Oct 29 04:40:25.901277 kubelet[1638]: I1029 04:40:25.901194 1638 kubelet.go:3194] "Creating a mirror pod for static pod" pod="kube-system/kube-apiserver-srv-jtkau.gb1.brightbox.com" Oct 29 04:40:25.911490 kubelet[1638]: W1029 04:40:25.911435 1638 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Oct 29 04:40:26.780938 systemd[1]: Reloading. Oct 29 04:40:26.929287 /usr/lib/systemd/system-generators/torcx-generator[1925]: time="2025-10-29T04:40:26Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.8 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.8 /var/lib/torcx/store]" Oct 29 04:40:26.930320 /usr/lib/systemd/system-generators/torcx-generator[1925]: time="2025-10-29T04:40:26Z" level=info msg="torcx already run" Oct 29 04:40:27.054458 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Oct 29 04:40:27.054951 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Oct 29 04:40:27.083432 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Oct 29 04:40:27.210000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.210000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.210000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.210000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.210000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.210000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.210000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.210000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.210000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.210000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.210000 audit: BPF prog-id=82 op=LOAD Oct 29 04:40:27.210000 audit: BPF prog-id=43 op=UNLOAD Oct 29 04:40:27.215000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.215000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.216000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.216000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.216000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.216000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.216000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.216000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.216000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.216000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.216000 audit: BPF prog-id=83 op=LOAD Oct 29 04:40:27.216000 audit: BPF prog-id=58 op=UNLOAD Oct 29 04:40:27.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.217000 audit: BPF prog-id=84 op=LOAD Oct 29 04:40:27.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.217000 audit: BPF prog-id=85 op=LOAD Oct 29 04:40:27.217000 audit: BPF prog-id=44 op=UNLOAD Oct 29 04:40:27.218000 audit: BPF prog-id=45 op=UNLOAD Oct 29 04:40:27.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.218000 audit: BPF prog-id=86 op=LOAD Oct 29 04:40:27.218000 audit: BPF prog-id=46 op=UNLOAD Oct 29 04:40:27.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.219000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.219000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.219000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.219000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.219000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.219000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.219000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.219000 audit: BPF prog-id=87 op=LOAD Oct 29 04:40:27.219000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.219000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.219000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.219000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.219000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.219000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.219000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.219000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.219000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.219000 audit: BPF prog-id=88 op=LOAD Oct 29 04:40:27.219000 audit: BPF prog-id=47 op=UNLOAD Oct 29 04:40:27.219000 audit: BPF prog-id=48 op=UNLOAD Oct 29 04:40:27.219000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.219000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.219000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.219000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.219000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.219000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.219000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.219000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.219000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.220000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.220000 audit: BPF prog-id=89 op=LOAD Oct 29 04:40:27.220000 audit: BPF prog-id=78 op=UNLOAD Oct 29 04:40:27.221000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.221000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.221000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.221000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.221000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.221000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.221000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.221000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.221000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.221000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.221000 audit: BPF prog-id=90 op=LOAD Oct 29 04:40:27.221000 audit: BPF prog-id=49 op=UNLOAD Oct 29 04:40:27.230000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.230000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.230000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.230000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.230000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.230000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.230000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.230000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.230000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.230000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.230000 audit: BPF prog-id=91 op=LOAD Oct 29 04:40:27.230000 audit: BPF prog-id=66 op=UNLOAD Oct 29 04:40:27.232000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.232000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.232000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.232000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.232000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.232000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.232000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.232000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.232000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.232000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.232000 audit: BPF prog-id=92 op=LOAD Oct 29 04:40:27.232000 audit: BPF prog-id=50 op=UNLOAD Oct 29 04:40:27.233000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.233000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.233000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.233000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.233000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.233000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.233000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.233000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.233000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.233000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.233000 audit: BPF prog-id=93 op=LOAD Oct 29 04:40:27.234000 audit: BPF prog-id=70 op=UNLOAD Oct 29 04:40:27.237000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.237000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.237000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.237000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.237000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.237000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.237000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.237000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.237000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.237000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.237000 audit: BPF prog-id=94 op=LOAD Oct 29 04:40:27.237000 audit: BPF prog-id=51 op=UNLOAD Oct 29 04:40:27.237000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.237000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.237000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.237000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.237000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.237000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.237000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.237000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.238000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.238000 audit: BPF prog-id=95 op=LOAD Oct 29 04:40:27.238000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.238000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.238000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.238000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.238000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.238000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.238000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.238000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.238000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.238000 audit: BPF prog-id=96 op=LOAD Oct 29 04:40:27.238000 audit: BPF prog-id=52 op=UNLOAD Oct 29 04:40:27.238000 audit: BPF prog-id=53 op=UNLOAD Oct 29 04:40:27.240000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.240000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.240000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.240000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.240000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.240000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.240000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.240000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.240000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.240000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.240000 audit: BPF prog-id=97 op=LOAD Oct 29 04:40:27.240000 audit: BPF prog-id=62 op=UNLOAD Oct 29 04:40:27.241000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.241000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.241000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.241000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.241000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.241000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.241000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.241000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.241000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.241000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.241000 audit: BPF prog-id=98 op=LOAD Oct 29 04:40:27.241000 audit: BPF prog-id=74 op=UNLOAD Oct 29 04:40:27.242000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.242000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.242000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.242000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.242000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.242000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.242000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.242000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.242000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.242000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.242000 audit: BPF prog-id=99 op=LOAD Oct 29 04:40:27.242000 audit: BPF prog-id=54 op=UNLOAD Oct 29 04:40:27.243000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.243000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.243000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.243000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.243000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.243000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.243000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.243000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.243000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.243000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.243000 audit: BPF prog-id=100 op=LOAD Oct 29 04:40:27.243000 audit: BPF prog-id=55 op=UNLOAD Oct 29 04:40:27.243000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.243000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.243000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.243000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.243000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.243000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.243000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.243000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.243000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.243000 audit: BPF prog-id=101 op=LOAD Oct 29 04:40:27.243000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.243000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.243000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.243000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.243000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.243000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.243000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.243000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.244000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:27.244000 audit: BPF prog-id=102 op=LOAD Oct 29 04:40:27.244000 audit: BPF prog-id=56 op=UNLOAD Oct 29 04:40:27.244000 audit: BPF prog-id=57 op=UNLOAD Oct 29 04:40:27.267117 systemd[1]: Stopping kubelet.service... Oct 29 04:40:27.296522 systemd[1]: kubelet.service: Deactivated successfully. Oct 29 04:40:27.296000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:40:27.297289 systemd[1]: Stopped kubelet.service. Oct 29 04:40:27.297434 systemd[1]: kubelet.service: Consumed 1.225s CPU time. Oct 29 04:40:27.300766 systemd[1]: Starting kubelet.service... Oct 29 04:40:28.430000 audit[1862]: AVC avc: denied { watch } for pid=1862 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526389 scontext=system_u:system_r:svirt_lxc_net_t:s0:c163,c778 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 29 04:40:28.434981 kernel: kauditd_printk_skb: 259 callbacks suppressed Oct 29 04:40:28.435094 kernel: audit: type=1400 audit(1761712828.430:810): avc: denied { watch } for pid=1862 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526389 scontext=system_u:system_r:svirt_lxc_net_t:s0:c163,c778 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 29 04:40:28.430000 audit[1862]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000c36580 a2=fc6 a3=0 items=0 ppid=1710 pid=1862 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c163,c778 key=(null) Oct 29 04:40:28.449641 kernel: audit: type=1300 audit(1761712828.430:810): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000c36580 a2=fc6 a3=0 items=0 ppid=1710 pid=1862 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c163,c778 key=(null) Oct 29 04:40:28.430000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 29 04:40:28.457635 kernel: audit: type=1327 audit(1761712828.430:810): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 29 04:40:28.434000 audit[1862]: AVC avc: denied { watch } for pid=1862 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526389 scontext=system_u:system_r:svirt_lxc_net_t:s0:c163,c778 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 29 04:40:28.434000 audit[1862]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000c36740 a2=fc6 a3=0 items=0 ppid=1710 pid=1862 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c163,c778 key=(null) Oct 29 04:40:28.474671 kernel: audit: type=1400 audit(1761712828.434:811): avc: denied { watch } for pid=1862 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526389 scontext=system_u:system_r:svirt_lxc_net_t:s0:c163,c778 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 29 04:40:28.474770 kernel: audit: type=1300 audit(1761712828.434:811): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000c36740 a2=fc6 a3=0 items=0 ppid=1710 pid=1862 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c163,c778 key=(null) Oct 29 04:40:28.434000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 29 04:40:28.482625 kernel: audit: type=1327 audit(1761712828.434:811): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 29 04:40:28.435000 audit[1862]: AVC avc: denied { watch } for pid=1862 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526389 scontext=system_u:system_r:svirt_lxc_net_t:s0:c163,c778 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 29 04:40:28.489623 kernel: audit: type=1400 audit(1761712828.435:812): avc: denied { watch } for pid=1862 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526389 scontext=system_u:system_r:svirt_lxc_net_t:s0:c163,c778 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 29 04:40:28.435000 audit[1862]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000c36900 a2=fc6 a3=0 items=0 ppid=1710 pid=1862 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c163,c778 key=(null) Oct 29 04:40:28.498634 kernel: audit: type=1300 audit(1761712828.435:812): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000c36900 a2=fc6 a3=0 items=0 ppid=1710 pid=1862 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c163,c778 key=(null) Oct 29 04:40:28.435000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 29 04:40:28.506628 kernel: audit: type=1327 audit(1761712828.435:812): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 29 04:40:28.437000 audit[1862]: AVC avc: denied { watch } for pid=1862 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526389 scontext=system_u:system_r:svirt_lxc_net_t:s0:c163,c778 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 29 04:40:28.515622 kernel: audit: type=1400 audit(1761712828.437:813): avc: denied { watch } for pid=1862 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526389 scontext=system_u:system_r:svirt_lxc_net_t:s0:c163,c778 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 29 04:40:28.437000 audit[1862]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000c36ac0 a2=fc6 a3=0 items=0 ppid=1710 pid=1862 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c163,c778 key=(null) Oct 29 04:40:28.437000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 29 04:40:28.814000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:40:28.811552 systemd[1]: Started kubelet.service. Oct 29 04:40:28.970762 kubelet[1975]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 29 04:40:28.971523 kubelet[1975]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. Oct 29 04:40:28.971671 kubelet[1975]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Oct 29 04:40:28.972041 kubelet[1975]: I1029 04:40:28.971972 1975 server.go:215] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Oct 29 04:40:28.997591 kubelet[1975]: I1029 04:40:28.996511 1975 server.go:520] "Kubelet version" kubeletVersion="v1.32.4" Oct 29 04:40:28.997991 kubelet[1975]: I1029 04:40:28.997966 1975 server.go:522] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Oct 29 04:40:29.001841 kubelet[1975]: I1029 04:40:29.001799 1975 server.go:954] "Client rotation is on, will bootstrap in background" Oct 29 04:40:29.013855 kubelet[1975]: I1029 04:40:29.013818 1975 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Oct 29 04:40:29.071414 kubelet[1975]: I1029 04:40:29.071021 1975 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Oct 29 04:40:29.082139 kubelet[1975]: E1029 04:40:29.081202 1975 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" Oct 29 04:40:29.082139 kubelet[1975]: I1029 04:40:29.081285 1975 server.go:1421] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." Oct 29 04:40:29.096215 kubelet[1975]: I1029 04:40:29.095972 1975 server.go:772] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Oct 29 04:40:29.096523 kubelet[1975]: I1029 04:40:29.096460 1975 container_manager_linux.go:268] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Oct 29 04:40:29.098319 kubelet[1975]: I1029 04:40:29.096518 1975 container_manager_linux.go:273] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"srv-jtkau.gb1.brightbox.com","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} Oct 29 04:40:29.098690 kubelet[1975]: I1029 04:40:29.098368 1975 topology_manager.go:138] "Creating topology manager with none policy" Oct 29 04:40:29.098690 kubelet[1975]: I1029 04:40:29.098390 1975 container_manager_linux.go:304] "Creating device plugin manager" Oct 29 04:40:29.098690 kubelet[1975]: I1029 04:40:29.098542 1975 state_mem.go:36] "Initialized new in-memory state store" Oct 29 04:40:29.099453 kubelet[1975]: I1029 04:40:29.099045 1975 kubelet.go:446] "Attempting to sync node with API server" Oct 29 04:40:29.112904 kubelet[1975]: I1029 04:40:29.112696 1975 kubelet.go:341] "Adding static pod path" path="/etc/kubernetes/manifests" Oct 29 04:40:29.112904 kubelet[1975]: I1029 04:40:29.112799 1975 kubelet.go:352] "Adding apiserver pod source" Oct 29 04:40:29.112904 kubelet[1975]: I1029 04:40:29.112829 1975 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Oct 29 04:40:29.117989 kubelet[1975]: I1029 04:40:29.117959 1975 kuberuntime_manager.go:269] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Oct 29 04:40:29.119612 kubelet[1975]: I1029 04:40:29.118847 1975 kubelet.go:890] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Oct 29 04:40:29.119846 kubelet[1975]: I1029 04:40:29.119765 1975 watchdog_linux.go:99] "Systemd watchdog is not enabled" Oct 29 04:40:29.119928 kubelet[1975]: I1029 04:40:29.119857 1975 server.go:1287] "Started kubelet" Oct 29 04:40:29.124501 kubelet[1975]: I1029 04:40:29.124472 1975 apiserver.go:52] "Watching apiserver" Oct 29 04:40:29.130000 audit[1975]: AVC avc: denied { mac_admin } for pid=1975 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:29.130000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 29 04:40:29.133253 kubelet[1975]: I1029 04:40:29.132255 1975 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Oct 29 04:40:29.133253 kubelet[1975]: I1029 04:40:29.133150 1975 server.go:243] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Oct 29 04:40:29.133392 kubelet[1975]: I1029 04:40:29.133281 1975 server.go:169] "Starting to listen" address="0.0.0.0" port=10250 Oct 29 04:40:29.130000 audit[1975]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000a59560 a1=c0005b53c8 a2=c000a59530 a3=25 items=0 ppid=1 pid=1975 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:29.130000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 29 04:40:29.135384 kubelet[1975]: I1029 04:40:29.135324 1975 kubelet.go:1507] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" Oct 29 04:40:29.135582 kubelet[1975]: I1029 04:40:29.135541 1975 kubelet.go:1511] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" Oct 29 04:40:29.134000 audit[1975]: AVC avc: denied { mac_admin } for pid=1975 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:29.134000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 29 04:40:29.134000 audit[1975]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b5a2e0 a1=c0005b5470 a2=c000a598f0 a3=25 items=0 ppid=1 pid=1975 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:29.134000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 29 04:40:29.151674 kubelet[1975]: I1029 04:40:29.151624 1975 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Oct 29 04:40:29.174146 kubelet[1975]: E1029 04:40:29.145463 1975 kubelet.go:1555] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Oct 29 04:40:29.176679 kubelet[1975]: I1029 04:40:29.144230 1975 server.go:479] "Adding debug handlers to kubelet server" Oct 29 04:40:29.179522 kubelet[1975]: I1029 04:40:29.152068 1975 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" Oct 29 04:40:29.183830 kubelet[1975]: I1029 04:40:29.183786 1975 volume_manager.go:297] "Starting Kubelet Volume Manager" Oct 29 04:40:29.187123 kubelet[1975]: I1029 04:40:29.186338 1975 desired_state_of_world_populator.go:150] "Desired state populator starts to run" Oct 29 04:40:29.187123 kubelet[1975]: I1029 04:40:29.186751 1975 reconciler.go:26] "Reconciler: start to sync state" Oct 29 04:40:29.194480 kubelet[1975]: I1029 04:40:29.194157 1975 factory.go:221] Registration of the systemd container factory successfully Oct 29 04:40:29.195793 kubelet[1975]: I1029 04:40:29.194543 1975 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Oct 29 04:40:29.223515 kubelet[1975]: I1029 04:40:29.222166 1975 factory.go:221] Registration of the containerd container factory successfully Oct 29 04:40:29.230697 kubelet[1975]: I1029 04:40:29.230626 1975 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Oct 29 04:40:29.240163 kubelet[1975]: I1029 04:40:29.240111 1975 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Oct 29 04:40:29.241676 kubelet[1975]: I1029 04:40:29.241650 1975 status_manager.go:227] "Starting to sync pod status with apiserver" Oct 29 04:40:29.243126 kubelet[1975]: I1029 04:40:29.241821 1975 watchdog_linux.go:127] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." Oct 29 04:40:29.243257 kubelet[1975]: I1029 04:40:29.243234 1975 kubelet.go:2382] "Starting kubelet main sync loop" Oct 29 04:40:29.244358 kubelet[1975]: E1029 04:40:29.244320 1975 kubelet.go:2406] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Oct 29 04:40:29.344902 kubelet[1975]: E1029 04:40:29.344751 1975 kubelet.go:2406] "Skipping pod synchronization" err="container runtime status check may not have completed yet" Oct 29 04:40:29.374557 kubelet[1975]: I1029 04:40:29.374517 1975 cpu_manager.go:221] "Starting CPU manager" policy="none" Oct 29 04:40:29.374828 kubelet[1975]: I1029 04:40:29.374801 1975 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" Oct 29 04:40:29.374975 kubelet[1975]: I1029 04:40:29.374952 1975 state_mem.go:36] "Initialized new in-memory state store" Oct 29 04:40:29.375420 kubelet[1975]: I1029 04:40:29.375392 1975 state_mem.go:88] "Updated default CPUSet" cpuSet="" Oct 29 04:40:29.375565 kubelet[1975]: I1029 04:40:29.375520 1975 state_mem.go:96] "Updated CPUSet assignments" assignments={} Oct 29 04:40:29.375831 kubelet[1975]: I1029 04:40:29.375807 1975 policy_none.go:49] "None policy: Start" Oct 29 04:40:29.376010 kubelet[1975]: I1029 04:40:29.375985 1975 memory_manager.go:186] "Starting memorymanager" policy="None" Oct 29 04:40:29.376159 kubelet[1975]: I1029 04:40:29.376136 1975 state_mem.go:35] "Initializing new in-memory state store" Oct 29 04:40:29.376513 kubelet[1975]: I1029 04:40:29.376490 1975 state_mem.go:75] "Updated machine memory state" Oct 29 04:40:29.387000 audit[1975]: AVC avc: denied { mac_admin } for pid=1975 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:29.387000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Oct 29 04:40:29.389035 kubelet[1975]: I1029 04:40:29.387553 1975 manager.go:519] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Oct 29 04:40:29.387000 audit[1975]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00109c210 a1=c00109e1b0 a2=c00109c1e0 a3=25 items=0 ppid=1 pid=1975 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:29.387000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Oct 29 04:40:29.390045 kubelet[1975]: I1029 04:40:29.390010 1975 server.go:94] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" Oct 29 04:40:29.393114 kubelet[1975]: I1029 04:40:29.393067 1975 eviction_manager.go:189] "Eviction manager: starting control loop" Oct 29 04:40:29.394314 kubelet[1975]: I1029 04:40:29.393266 1975 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Oct 29 04:40:29.395966 kubelet[1975]: I1029 04:40:29.395942 1975 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Oct 29 04:40:29.401715 kubelet[1975]: E1029 04:40:29.401682 1975 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" Oct 29 04:40:29.524910 kubelet[1975]: I1029 04:40:29.524858 1975 kubelet_node_status.go:75] "Attempting to register node" node="srv-jtkau.gb1.brightbox.com" Oct 29 04:40:29.540089 kubelet[1975]: I1029 04:40:29.540027 1975 kubelet_node_status.go:124] "Node was previously registered" node="srv-jtkau.gb1.brightbox.com" Oct 29 04:40:29.540320 kubelet[1975]: I1029 04:40:29.540273 1975 kubelet_node_status.go:78] "Successfully registered node" node="srv-jtkau.gb1.brightbox.com" Oct 29 04:40:29.548997 kubelet[1975]: I1029 04:40:29.548950 1975 kubelet.go:3194] "Creating a mirror pod for static pod" pod="kube-system/kube-controller-manager-srv-jtkau.gb1.brightbox.com" Oct 29 04:40:29.579085 kubelet[1975]: W1029 04:40:29.578729 1975 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Oct 29 04:40:29.587456 kubelet[1975]: I1029 04:40:29.587413 1975 desired_state_of_world_populator.go:158] "Finished populating initial desired state of world" Oct 29 04:40:29.593595 kubelet[1975]: I1029 04:40:29.593547 1975 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/e416a32eced17a63c43b6a5376efe009-ca-certs\") pod \"kube-apiserver-srv-jtkau.gb1.brightbox.com\" (UID: \"e416a32eced17a63c43b6a5376efe009\") " pod="kube-system/kube-apiserver-srv-jtkau.gb1.brightbox.com" Oct 29 04:40:29.593869 kubelet[1975]: I1029 04:40:29.593842 1975 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/e416a32eced17a63c43b6a5376efe009-k8s-certs\") pod \"kube-apiserver-srv-jtkau.gb1.brightbox.com\" (UID: \"e416a32eced17a63c43b6a5376efe009\") " pod="kube-system/kube-apiserver-srv-jtkau.gb1.brightbox.com" Oct 29 04:40:29.594108 kubelet[1975]: I1029 04:40:29.594042 1975 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/9517140ae410c9485fff58fee34dabe2-kubeconfig\") pod \"kube-controller-manager-srv-jtkau.gb1.brightbox.com\" (UID: \"9517140ae410c9485fff58fee34dabe2\") " pod="kube-system/kube-controller-manager-srv-jtkau.gb1.brightbox.com" Oct 29 04:40:29.594303 kubelet[1975]: I1029 04:40:29.594250 1975 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/9517140ae410c9485fff58fee34dabe2-usr-share-ca-certificates\") pod \"kube-controller-manager-srv-jtkau.gb1.brightbox.com\" (UID: \"9517140ae410c9485fff58fee34dabe2\") " pod="kube-system/kube-controller-manager-srv-jtkau.gb1.brightbox.com" Oct 29 04:40:29.594464 kubelet[1975]: I1029 04:40:29.594438 1975 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/9517140ae410c9485fff58fee34dabe2-k8s-certs\") pod \"kube-controller-manager-srv-jtkau.gb1.brightbox.com\" (UID: \"9517140ae410c9485fff58fee34dabe2\") " pod="kube-system/kube-controller-manager-srv-jtkau.gb1.brightbox.com" Oct 29 04:40:29.594621 kubelet[1975]: I1029 04:40:29.594576 1975 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/4c4accd07c0e12839179c296d86df4a0-kubeconfig\") pod \"kube-scheduler-srv-jtkau.gb1.brightbox.com\" (UID: \"4c4accd07c0e12839179c296d86df4a0\") " pod="kube-system/kube-scheduler-srv-jtkau.gb1.brightbox.com" Oct 29 04:40:29.595260 kubelet[1975]: I1029 04:40:29.595139 1975 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/e416a32eced17a63c43b6a5376efe009-usr-share-ca-certificates\") pod \"kube-apiserver-srv-jtkau.gb1.brightbox.com\" (UID: \"e416a32eced17a63c43b6a5376efe009\") " pod="kube-system/kube-apiserver-srv-jtkau.gb1.brightbox.com" Oct 29 04:40:29.595425 kubelet[1975]: I1029 04:40:29.595395 1975 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/9517140ae410c9485fff58fee34dabe2-ca-certs\") pod \"kube-controller-manager-srv-jtkau.gb1.brightbox.com\" (UID: \"9517140ae410c9485fff58fee34dabe2\") " pod="kube-system/kube-controller-manager-srv-jtkau.gb1.brightbox.com" Oct 29 04:40:29.595619 kubelet[1975]: I1029 04:40:29.595555 1975 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/9517140ae410c9485fff58fee34dabe2-flexvolume-dir\") pod \"kube-controller-manager-srv-jtkau.gb1.brightbox.com\" (UID: \"9517140ae410c9485fff58fee34dabe2\") " pod="kube-system/kube-controller-manager-srv-jtkau.gb1.brightbox.com" Oct 29 04:40:29.627438 kubelet[1975]: I1029 04:40:29.627347 1975 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-apiserver-srv-jtkau.gb1.brightbox.com" podStartSLOduration=4.627307647 podStartE2EDuration="4.627307647s" podCreationTimestamp="2025-10-29 04:40:25 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-10-29 04:40:29.624091375 +0000 UTC m=+0.789159332" watchObservedRunningTime="2025-10-29 04:40:29.627307647 +0000 UTC m=+0.792375586" Oct 29 04:40:29.628093 kubelet[1975]: I1029 04:40:29.628029 1975 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-scheduler-srv-jtkau.gb1.brightbox.com" podStartSLOduration=4.628018712 podStartE2EDuration="4.628018712s" podCreationTimestamp="2025-10-29 04:40:25 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-10-29 04:40:29.612966041 +0000 UTC m=+0.778033978" watchObservedRunningTime="2025-10-29 04:40:29.628018712 +0000 UTC m=+0.793086650" Oct 29 04:40:29.643203 kubelet[1975]: I1029 04:40:29.643107 1975 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-controller-manager-srv-jtkau.gb1.brightbox.com" podStartSLOduration=0.643086589 podStartE2EDuration="643.086589ms" podCreationTimestamp="2025-10-29 04:40:29 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-10-29 04:40:29.640906478 +0000 UTC m=+0.805974408" watchObservedRunningTime="2025-10-29 04:40:29.643086589 +0000 UTC m=+0.808154520" Oct 29 04:40:30.056000 audit[1862]: AVC avc: denied { watch } for pid=1862 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=526422 scontext=system_u:system_r:svirt_lxc_net_t:s0:c163,c778 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Oct 29 04:40:30.056000 audit[1862]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000567a00 a2=fc6 a3=0 items=0 ppid=1710 pid=1862 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c163,c778 key=(null) Oct 29 04:40:30.056000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 29 04:40:33.139991 kubelet[1975]: I1029 04:40:33.139891 1975 kuberuntime_manager.go:1702] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Oct 29 04:40:33.142582 env[1204]: time="2025-10-29T04:40:33.142365453Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Oct 29 04:40:33.143418 kubelet[1975]: I1029 04:40:33.143392 1975 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Oct 29 04:40:33.890168 systemd[1]: Created slice kubepods-besteffort-podba8f2b9e_14f4_442c_8c6e_8351c22f6d53.slice. Oct 29 04:40:33.925382 kubelet[1975]: I1029 04:40:33.925273 1975 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/ba8f2b9e-14f4-442c-8c6e-8351c22f6d53-kube-proxy\") pod \"kube-proxy-xfvq4\" (UID: \"ba8f2b9e-14f4-442c-8c6e-8351c22f6d53\") " pod="kube-system/kube-proxy-xfvq4" Oct 29 04:40:33.925382 kubelet[1975]: I1029 04:40:33.925375 1975 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-xpqdz\" (UniqueName: \"kubernetes.io/projected/ba8f2b9e-14f4-442c-8c6e-8351c22f6d53-kube-api-access-xpqdz\") pod \"kube-proxy-xfvq4\" (UID: \"ba8f2b9e-14f4-442c-8c6e-8351c22f6d53\") " pod="kube-system/kube-proxy-xfvq4" Oct 29 04:40:33.925956 kubelet[1975]: I1029 04:40:33.925470 1975 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/ba8f2b9e-14f4-442c-8c6e-8351c22f6d53-xtables-lock\") pod \"kube-proxy-xfvq4\" (UID: \"ba8f2b9e-14f4-442c-8c6e-8351c22f6d53\") " pod="kube-system/kube-proxy-xfvq4" Oct 29 04:40:33.925956 kubelet[1975]: I1029 04:40:33.925528 1975 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/ba8f2b9e-14f4-442c-8c6e-8351c22f6d53-lib-modules\") pod \"kube-proxy-xfvq4\" (UID: \"ba8f2b9e-14f4-442c-8c6e-8351c22f6d53\") " pod="kube-system/kube-proxy-xfvq4" Oct 29 04:40:34.036253 kubelet[1975]: I1029 04:40:34.036198 1975 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" Oct 29 04:40:34.188989 systemd[1]: Created slice kubepods-besteffort-podc92d9d6b_b0cd_4295_859c_4bdde2a7103c.slice. Oct 29 04:40:34.210272 env[1204]: time="2025-10-29T04:40:34.208261892Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-xfvq4,Uid:ba8f2b9e-14f4-442c-8c6e-8351c22f6d53,Namespace:kube-system,Attempt:0,}" Oct 29 04:40:34.230550 kubelet[1975]: I1029 04:40:34.230497 1975 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-7dr5m\" (UniqueName: \"kubernetes.io/projected/c92d9d6b-b0cd-4295-859c-4bdde2a7103c-kube-api-access-7dr5m\") pod \"tigera-operator-7dcd859c48-fwfbp\" (UID: \"c92d9d6b-b0cd-4295-859c-4bdde2a7103c\") " pod="tigera-operator/tigera-operator-7dcd859c48-fwfbp" Oct 29 04:40:34.231069 kubelet[1975]: I1029 04:40:34.230646 1975 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/c92d9d6b-b0cd-4295-859c-4bdde2a7103c-var-lib-calico\") pod \"tigera-operator-7dcd859c48-fwfbp\" (UID: \"c92d9d6b-b0cd-4295-859c-4bdde2a7103c\") " pod="tigera-operator/tigera-operator-7dcd859c48-fwfbp" Oct 29 04:40:34.248011 env[1204]: time="2025-10-29T04:40:34.247831609Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 29 04:40:34.248260 env[1204]: time="2025-10-29T04:40:34.247978680Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 29 04:40:34.248399 env[1204]: time="2025-10-29T04:40:34.248228771Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 29 04:40:34.249024 env[1204]: time="2025-10-29T04:40:34.248928422Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/9236516a9dd3024a83cfdc6a495fa6e6e64cc63217e4f95c8a17306769976790 pid=2028 runtime=io.containerd.runc.v2 Oct 29 04:40:34.287381 systemd[1]: Started cri-containerd-9236516a9dd3024a83cfdc6a495fa6e6e64cc63217e4f95c8a17306769976790.scope. Oct 29 04:40:34.372000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:34.381642 kernel: kauditd_printk_skb: 18 callbacks suppressed Oct 29 04:40:34.381907 kernel: audit: type=1400 audit(1761712834.372:819): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:34.372000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:34.372000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:34.397130 kernel: audit: type=1400 audit(1761712834.372:820): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:34.397371 kernel: audit: type=1400 audit(1761712834.372:821): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:34.397538 kernel: audit: type=1400 audit(1761712834.372:822): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:34.372000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:34.405913 kernel: audit: type=1400 audit(1761712834.372:823): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:34.372000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:34.372000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:34.430631 kernel: audit: type=1400 audit(1761712834.372:824): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:34.372000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:34.441469 kernel: audit: type=1400 audit(1761712834.372:825): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:34.372000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:34.372000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:34.455218 kernel: audit: type=1400 audit(1761712834.372:826): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:34.455378 kernel: audit: type=1400 audit(1761712834.372:827): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:34.372000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:34.462637 kernel: audit: type=1400 audit(1761712834.372:828): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:34.372000 audit: BPF prog-id=103 op=LOAD Oct 29 04:40:34.382000 audit[2038]: AVC avc: denied { bpf } for pid=2038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:34.382000 audit[2038]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2028 pid=2038 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:34.382000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932333635313661396464333032346138336366646336613439356661 Oct 29 04:40:34.382000 audit[2038]: AVC avc: denied { perfmon } for pid=2038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:34.382000 audit[2038]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=2028 pid=2038 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:34.382000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932333635313661396464333032346138336366646336613439356661 Oct 29 04:40:34.382000 audit[2038]: AVC avc: denied { bpf } for pid=2038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:34.382000 audit[2038]: AVC avc: denied { bpf } for pid=2038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:34.382000 audit[2038]: AVC avc: denied { bpf } for pid=2038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:34.382000 audit[2038]: AVC avc: denied { perfmon } for pid=2038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:34.382000 audit[2038]: AVC avc: denied { perfmon } for pid=2038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:34.382000 audit[2038]: AVC avc: denied { perfmon } for pid=2038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:34.382000 audit[2038]: AVC avc: denied { perfmon } for pid=2038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:34.382000 audit[2038]: AVC avc: denied { perfmon } for pid=2038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:34.382000 audit[2038]: AVC avc: denied { bpf } for pid=2038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:34.382000 audit[2038]: AVC avc: denied { bpf } for pid=2038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:34.382000 audit: BPF prog-id=104 op=LOAD Oct 29 04:40:34.382000 audit[2038]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c00031bb70 items=0 ppid=2028 pid=2038 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:34.382000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932333635313661396464333032346138336366646336613439356661 Oct 29 04:40:34.385000 audit[2038]: AVC avc: denied { bpf } for pid=2038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:34.385000 audit[2038]: AVC avc: denied { bpf } for pid=2038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:34.385000 audit[2038]: AVC avc: denied { perfmon } for pid=2038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:34.385000 audit[2038]: AVC avc: denied { perfmon } for pid=2038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:34.385000 audit[2038]: AVC avc: denied { perfmon } for pid=2038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:34.385000 audit[2038]: AVC avc: denied { perfmon } for pid=2038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:34.385000 audit[2038]: AVC avc: denied { perfmon } for pid=2038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:34.385000 audit[2038]: AVC avc: denied { bpf } for pid=2038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:34.385000 audit[2038]: AVC avc: denied { bpf } for pid=2038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:34.385000 audit: BPF prog-id=105 op=LOAD Oct 29 04:40:34.385000 audit[2038]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c00031bbb8 items=0 ppid=2028 pid=2038 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:34.385000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932333635313661396464333032346138336366646336613439356661 Oct 29 04:40:34.385000 audit: BPF prog-id=105 op=UNLOAD Oct 29 04:40:34.386000 audit: BPF prog-id=104 op=UNLOAD Oct 29 04:40:34.386000 audit[2038]: AVC avc: denied { bpf } for pid=2038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:34.386000 audit[2038]: AVC avc: denied { bpf } for pid=2038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:34.386000 audit[2038]: AVC avc: denied { bpf } for pid=2038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:34.386000 audit[2038]: AVC avc: denied { perfmon } for pid=2038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:34.386000 audit[2038]: AVC avc: denied { perfmon } for pid=2038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:34.386000 audit[2038]: AVC avc: denied { perfmon } for pid=2038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:34.386000 audit[2038]: AVC avc: denied { perfmon } for pid=2038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:34.386000 audit[2038]: AVC avc: denied { perfmon } for pid=2038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:34.386000 audit[2038]: AVC avc: denied { bpf } for pid=2038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:34.386000 audit[2038]: AVC avc: denied { bpf } for pid=2038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:34.386000 audit: BPF prog-id=106 op=LOAD Oct 29 04:40:34.386000 audit[2038]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c00031bfc8 items=0 ppid=2028 pid=2038 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:34.386000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932333635313661396464333032346138336366646336613439356661 Oct 29 04:40:34.476434 env[1204]: time="2025-10-29T04:40:34.476289700Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-xfvq4,Uid:ba8f2b9e-14f4-442c-8c6e-8351c22f6d53,Namespace:kube-system,Attempt:0,} returns sandbox id \"9236516a9dd3024a83cfdc6a495fa6e6e64cc63217e4f95c8a17306769976790\"" Oct 29 04:40:34.486100 env[1204]: time="2025-10-29T04:40:34.486037117Z" level=info msg="CreateContainer within sandbox \"9236516a9dd3024a83cfdc6a495fa6e6e64cc63217e4f95c8a17306769976790\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Oct 29 04:40:34.496340 env[1204]: time="2025-10-29T04:40:34.496286061Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-7dcd859c48-fwfbp,Uid:c92d9d6b-b0cd-4295-859c-4bdde2a7103c,Namespace:tigera-operator,Attempt:0,}" Oct 29 04:40:34.517046 env[1204]: time="2025-10-29T04:40:34.516916152Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 29 04:40:34.517461 env[1204]: time="2025-10-29T04:40:34.517079160Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 29 04:40:34.517461 env[1204]: time="2025-10-29T04:40:34.517165913Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 29 04:40:34.518068 env[1204]: time="2025-10-29T04:40:34.518006430Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b11528b70327104f46b0e2047e959fa39df05976a0961e9b8651c9128accf7de pid=2071 runtime=io.containerd.runc.v2 Oct 29 04:40:34.542309 systemd[1]: Started cri-containerd-b11528b70327104f46b0e2047e959fa39df05976a0961e9b8651c9128accf7de.scope. Oct 29 04:40:34.564899 env[1204]: time="2025-10-29T04:40:34.564773685Z" level=info msg="CreateContainer within sandbox \"9236516a9dd3024a83cfdc6a495fa6e6e64cc63217e4f95c8a17306769976790\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"7a36d644d7949ab0c630ce75100b1acd4267e767dac02ba5bea2605430e0bc28\"" Oct 29 04:40:34.569937 env[1204]: time="2025-10-29T04:40:34.569876379Z" level=info msg="StartContainer for \"7a36d644d7949ab0c630ce75100b1acd4267e767dac02ba5bea2605430e0bc28\"" Oct 29 04:40:34.587000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:34.587000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:34.587000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:34.587000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:34.587000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:34.587000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:34.587000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:34.587000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:34.587000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:34.587000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:34.587000 audit: BPF prog-id=107 op=LOAD Oct 29 04:40:34.588000 audit[2081]: AVC avc: denied { bpf } for pid=2081 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:34.588000 audit[2081]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2071 pid=2081 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:34.588000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231313532386237303332373130346634366230653230343765393539 Oct 29 04:40:34.588000 audit[2081]: AVC avc: denied { perfmon } for pid=2081 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:34.588000 audit[2081]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=2071 pid=2081 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:34.588000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231313532386237303332373130346634366230653230343765393539 Oct 29 04:40:34.588000 audit[2081]: AVC avc: denied { bpf } for pid=2081 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:34.588000 audit[2081]: AVC avc: denied { bpf } for pid=2081 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:34.588000 audit[2081]: AVC avc: denied { bpf } for pid=2081 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:34.588000 audit[2081]: AVC avc: denied { perfmon } for pid=2081 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:34.588000 audit[2081]: AVC avc: denied { perfmon } for pid=2081 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:34.588000 audit[2081]: AVC avc: denied { perfmon } for pid=2081 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:34.588000 audit[2081]: AVC avc: denied { perfmon } for pid=2081 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:34.588000 audit[2081]: AVC avc: denied { perfmon } for pid=2081 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:34.588000 audit[2081]: AVC avc: denied { bpf } for pid=2081 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:34.588000 audit[2081]: AVC avc: denied { bpf } for pid=2081 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:34.588000 audit: BPF prog-id=108 op=LOAD Oct 29 04:40:34.588000 audit[2081]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c000380e60 items=0 ppid=2071 pid=2081 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:34.588000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231313532386237303332373130346634366230653230343765393539 Oct 29 04:40:34.589000 audit[2081]: AVC avc: denied { bpf } for pid=2081 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:34.589000 audit[2081]: AVC avc: denied { bpf } for pid=2081 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:34.589000 audit[2081]: AVC avc: denied { perfmon } for pid=2081 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:34.589000 audit[2081]: AVC avc: denied { perfmon } for pid=2081 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:34.589000 audit[2081]: AVC avc: denied { perfmon } for pid=2081 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:34.589000 audit[2081]: AVC avc: denied { perfmon } for pid=2081 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:34.589000 audit[2081]: AVC avc: denied { perfmon } for pid=2081 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:34.589000 audit[2081]: AVC avc: denied { bpf } for pid=2081 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:34.589000 audit[2081]: AVC avc: denied { bpf } for pid=2081 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:34.589000 audit: BPF prog-id=109 op=LOAD Oct 29 04:40:34.589000 audit[2081]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c000380ea8 items=0 ppid=2071 pid=2081 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:34.589000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231313532386237303332373130346634366230653230343765393539 Oct 29 04:40:34.589000 audit: BPF prog-id=109 op=UNLOAD Oct 29 04:40:34.589000 audit: BPF prog-id=108 op=UNLOAD Oct 29 04:40:34.589000 audit[2081]: AVC avc: denied { bpf } for pid=2081 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:34.589000 audit[2081]: AVC avc: denied { bpf } for pid=2081 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:34.589000 audit[2081]: AVC avc: denied { bpf } for pid=2081 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:34.589000 audit[2081]: AVC avc: denied { perfmon } for pid=2081 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:34.589000 audit[2081]: AVC avc: denied { perfmon } for pid=2081 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:34.589000 audit[2081]: AVC avc: denied { perfmon } for pid=2081 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:34.589000 audit[2081]: AVC avc: denied { perfmon } for pid=2081 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:34.589000 audit[2081]: AVC avc: denied { perfmon } for pid=2081 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:34.589000 audit[2081]: AVC avc: denied { bpf } for pid=2081 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:34.589000 audit[2081]: AVC avc: denied { bpf } for pid=2081 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:34.589000 audit: BPF prog-id=110 op=LOAD Oct 29 04:40:34.589000 audit[2081]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c0003812b8 items=0 ppid=2071 pid=2081 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:34.589000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231313532386237303332373130346634366230653230343765393539 Oct 29 04:40:34.618128 systemd[1]: Started cri-containerd-7a36d644d7949ab0c630ce75100b1acd4267e767dac02ba5bea2605430e0bc28.scope. Oct 29 04:40:34.685124 env[1204]: time="2025-10-29T04:40:34.684962848Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-7dcd859c48-fwfbp,Uid:c92d9d6b-b0cd-4295-859c-4bdde2a7103c,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"b11528b70327104f46b0e2047e959fa39df05976a0961e9b8651c9128accf7de\"" Oct 29 04:40:34.691385 env[1204]: time="2025-10-29T04:40:34.691347135Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.38.7\"" Oct 29 04:40:34.715000 audit[2106]: AVC avc: denied { perfmon } for pid=2106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:34.715000 audit[2106]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7efcbe081088 items=0 ppid=2028 pid=2106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:34.715000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761333664363434643739343961623063363330636537353130306231 Oct 29 04:40:34.715000 audit[2106]: AVC avc: denied { bpf } for pid=2106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:34.715000 audit[2106]: AVC avc: denied { bpf } for pid=2106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:34.715000 audit[2106]: AVC avc: denied { bpf } for pid=2106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:34.715000 audit[2106]: AVC avc: denied { perfmon } for pid=2106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:34.715000 audit[2106]: AVC avc: denied { perfmon } for pid=2106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:34.715000 audit[2106]: AVC avc: denied { perfmon } for pid=2106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:34.715000 audit[2106]: AVC avc: denied { perfmon } for pid=2106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:34.715000 audit[2106]: AVC avc: denied { perfmon } for pid=2106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:34.715000 audit[2106]: AVC avc: denied { bpf } for pid=2106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:34.715000 audit[2106]: AVC avc: denied { bpf } for pid=2106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:34.715000 audit: BPF prog-id=111 op=LOAD Oct 29 04:40:34.715000 audit[2106]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0003006f8 items=0 ppid=2028 pid=2106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:34.715000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761333664363434643739343961623063363330636537353130306231 Oct 29 04:40:34.715000 audit[2106]: AVC avc: denied { bpf } for pid=2106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:34.715000 audit[2106]: AVC avc: denied { bpf } for pid=2106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:34.715000 audit[2106]: AVC avc: denied { perfmon } for pid=2106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:34.715000 audit[2106]: AVC avc: denied { perfmon } for pid=2106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:34.715000 audit[2106]: AVC avc: denied { perfmon } for pid=2106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:34.715000 audit[2106]: AVC avc: denied { perfmon } for pid=2106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:34.715000 audit[2106]: AVC avc: denied { perfmon } for pid=2106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:34.715000 audit[2106]: AVC avc: denied { bpf } for pid=2106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:34.715000 audit[2106]: AVC avc: denied { bpf } for pid=2106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:34.715000 audit: BPF prog-id=112 op=LOAD Oct 29 04:40:34.715000 audit[2106]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c000300748 items=0 ppid=2028 pid=2106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:34.715000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761333664363434643739343961623063363330636537353130306231 Oct 29 04:40:34.715000 audit: BPF prog-id=112 op=UNLOAD Oct 29 04:40:34.715000 audit: BPF prog-id=111 op=UNLOAD Oct 29 04:40:34.715000 audit[2106]: AVC avc: denied { bpf } for pid=2106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:34.715000 audit[2106]: AVC avc: denied { bpf } for pid=2106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:34.715000 audit[2106]: AVC avc: denied { bpf } for pid=2106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:34.715000 audit[2106]: AVC avc: denied { perfmon } for pid=2106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:34.715000 audit[2106]: AVC avc: denied { perfmon } for pid=2106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:34.715000 audit[2106]: AVC avc: denied { perfmon } for pid=2106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:34.715000 audit[2106]: AVC avc: denied { perfmon } for pid=2106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:34.715000 audit[2106]: AVC avc: denied { perfmon } for pid=2106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:34.715000 audit[2106]: AVC avc: denied { bpf } for pid=2106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:34.715000 audit[2106]: AVC avc: denied { bpf } for pid=2106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:34.715000 audit: BPF prog-id=113 op=LOAD Oct 29 04:40:34.715000 audit[2106]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0003007d8 items=0 ppid=2028 pid=2106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:34.715000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761333664363434643739343961623063363330636537353130306231 Oct 29 04:40:34.754115 env[1204]: time="2025-10-29T04:40:34.754046781Z" level=info msg="StartContainer for \"7a36d644d7949ab0c630ce75100b1acd4267e767dac02ba5bea2605430e0bc28\" returns successfully" Oct 29 04:40:35.227000 audit[2171]: NETFILTER_CFG table=mangle:38 family=10 entries=1 op=nft_register_chain pid=2171 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 04:40:35.227000 audit[2171]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffebacde120 a2=0 a3=7ffebacde10c items=0 ppid=2117 pid=2171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:35.231000 audit[2170]: NETFILTER_CFG table=mangle:39 family=2 entries=1 op=nft_register_chain pid=2170 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 04:40:35.231000 audit[2170]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffffc10c190 a2=0 a3=7ffffc10c17c items=0 ppid=2117 pid=2170 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:35.231000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Oct 29 04:40:35.227000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Oct 29 04:40:35.245000 audit[2176]: NETFILTER_CFG table=nat:40 family=10 entries=1 op=nft_register_chain pid=2176 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 04:40:35.245000 audit[2176]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc63a67da0 a2=0 a3=7ffc63a67d8c items=0 ppid=2117 pid=2176 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:35.245000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Oct 29 04:40:35.249000 audit[2177]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=2177 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 04:40:35.249000 audit[2177]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcfcbb2920 a2=0 a3=7ffcfcbb290c items=0 ppid=2117 pid=2177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:35.249000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Oct 29 04:40:35.265000 audit[2175]: NETFILTER_CFG table=nat:42 family=2 entries=1 op=nft_register_chain pid=2175 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 04:40:35.265000 audit[2175]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffffc5469c0 a2=0 a3=7ffffc5469ac items=0 ppid=2117 pid=2175 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:35.265000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Oct 29 04:40:35.268000 audit[2178]: NETFILTER_CFG table=filter:43 family=2 entries=1 op=nft_register_chain pid=2178 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 04:40:35.268000 audit[2178]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc4114c600 a2=0 a3=7ffc4114c5ec items=0 ppid=2117 pid=2178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:35.268000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Oct 29 04:40:35.344000 audit[2179]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2179 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 04:40:35.344000 audit[2179]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fff3cefa840 a2=0 a3=7fff3cefa82c items=0 ppid=2117 pid=2179 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:35.344000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Oct 29 04:40:35.355000 audit[2181]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2181 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 04:40:35.355000 audit[2181]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7fff9bab8880 a2=0 a3=7fff9bab886c items=0 ppid=2117 pid=2181 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:35.355000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Oct 29 04:40:35.370000 audit[2184]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2184 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 04:40:35.370000 audit[2184]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7fff045bb200 a2=0 a3=7fff045bb1ec items=0 ppid=2117 pid=2184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:35.370000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Oct 29 04:40:35.373000 audit[2185]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2185 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 04:40:35.373000 audit[2185]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffedf19bbc0 a2=0 a3=7ffedf19bbac items=0 ppid=2117 pid=2185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:35.373000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Oct 29 04:40:35.378000 audit[2187]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2187 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 04:40:35.378000 audit[2187]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffeb52e93e0 a2=0 a3=7ffeb52e93cc items=0 ppid=2117 pid=2187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:35.378000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Oct 29 04:40:35.381000 audit[2188]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2188 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 04:40:35.381000 audit[2188]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffe6bed160 a2=0 a3=7fffe6bed14c items=0 ppid=2117 pid=2188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:35.381000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Oct 29 04:40:35.392000 audit[2190]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2190 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 04:40:35.392000 audit[2190]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc3b580ba0 a2=0 a3=7ffc3b580b8c items=0 ppid=2117 pid=2190 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:35.392000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Oct 29 04:40:35.399000 audit[2193]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2193 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 04:40:35.399000 audit[2193]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff129b8270 a2=0 a3=7fff129b825c items=0 ppid=2117 pid=2193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:35.399000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Oct 29 04:40:35.401000 audit[2194]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2194 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 04:40:35.401000 audit[2194]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdd0294a30 a2=0 a3=7ffdd0294a1c items=0 ppid=2117 pid=2194 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:35.401000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Oct 29 04:40:35.405000 audit[2196]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2196 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 04:40:35.405000 audit[2196]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc37812b40 a2=0 a3=7ffc37812b2c items=0 ppid=2117 pid=2196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:35.405000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Oct 29 04:40:35.407000 audit[2197]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2197 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 04:40:35.407000 audit[2197]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe11be84d0 a2=0 a3=7ffe11be84bc items=0 ppid=2117 pid=2197 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:35.407000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Oct 29 04:40:35.411000 audit[2199]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2199 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 04:40:35.411000 audit[2199]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdfa4afe80 a2=0 a3=7ffdfa4afe6c items=0 ppid=2117 pid=2199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:35.411000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Oct 29 04:40:35.427000 audit[2202]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2202 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 04:40:35.427000 audit[2202]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe38082a70 a2=0 a3=7ffe38082a5c items=0 ppid=2117 pid=2202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:35.427000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Oct 29 04:40:35.435000 audit[2205]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2205 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 04:40:35.435000 audit[2205]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffca0856190 a2=0 a3=7ffca085617c items=0 ppid=2117 pid=2205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:35.435000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Oct 29 04:40:35.437000 audit[2206]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2206 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 04:40:35.437000 audit[2206]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffe56bdd3c0 a2=0 a3=7ffe56bdd3ac items=0 ppid=2117 pid=2206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:35.437000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Oct 29 04:40:35.444000 audit[2208]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2208 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 04:40:35.444000 audit[2208]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffe01e90030 a2=0 a3=7ffe01e9001c items=0 ppid=2117 pid=2208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:35.444000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 29 04:40:35.451000 audit[2211]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2211 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 04:40:35.451000 audit[2211]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffee2fcc680 a2=0 a3=7ffee2fcc66c items=0 ppid=2117 pid=2211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:35.451000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 29 04:40:35.453000 audit[2212]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2212 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 04:40:35.453000 audit[2212]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd7b5d8b00 a2=0 a3=7ffd7b5d8aec items=0 ppid=2117 pid=2212 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:35.453000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Oct 29 04:40:35.458000 audit[2214]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2214 subj=system_u:system_r:kernel_t:s0 comm="iptables" Oct 29 04:40:35.458000 audit[2214]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7fff8a50f850 a2=0 a3=7fff8a50f83c items=0 ppid=2117 pid=2214 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:35.458000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Oct 29 04:40:35.507000 audit[2220]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2220 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 29 04:40:35.507000 audit[2220]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffca2f24b80 a2=0 a3=7ffca2f24b6c items=0 ppid=2117 pid=2220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:35.507000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 29 04:40:35.518000 audit[2220]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2220 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 29 04:40:35.518000 audit[2220]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7ffca2f24b80 a2=0 a3=7ffca2f24b6c items=0 ppid=2117 pid=2220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:35.518000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 29 04:40:35.521000 audit[2225]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2225 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 04:40:35.521000 audit[2225]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffcb3df6d10 a2=0 a3=7ffcb3df6cfc items=0 ppid=2117 pid=2225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:35.521000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Oct 29 04:40:35.525000 audit[2227]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2227 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 04:40:35.525000 audit[2227]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffeec8fdd80 a2=0 a3=7ffeec8fdd6c items=0 ppid=2117 pid=2227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:35.525000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Oct 29 04:40:35.532000 audit[2230]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2230 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 04:40:35.532000 audit[2230]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fffd1562390 a2=0 a3=7fffd156237c items=0 ppid=2117 pid=2230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:35.532000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Oct 29 04:40:35.534000 audit[2231]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2231 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 04:40:35.534000 audit[2231]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffd5344000 a2=0 a3=7fffd5343fec items=0 ppid=2117 pid=2231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:35.534000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Oct 29 04:40:35.538000 audit[2233]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2233 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 04:40:35.538000 audit[2233]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc1e36b5e0 a2=0 a3=7ffc1e36b5cc items=0 ppid=2117 pid=2233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:35.538000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Oct 29 04:40:35.540000 audit[2234]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2234 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 04:40:35.540000 audit[2234]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe35175d70 a2=0 a3=7ffe35175d5c items=0 ppid=2117 pid=2234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:35.540000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Oct 29 04:40:35.546000 audit[2236]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2236 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 04:40:35.546000 audit[2236]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffde05cb680 a2=0 a3=7ffde05cb66c items=0 ppid=2117 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:35.546000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Oct 29 04:40:35.553000 audit[2239]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2239 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 04:40:35.553000 audit[2239]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7fffbdde6910 a2=0 a3=7fffbdde68fc items=0 ppid=2117 pid=2239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:35.553000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Oct 29 04:40:35.555000 audit[2240]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2240 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 04:40:35.555000 audit[2240]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff0e800e30 a2=0 a3=7fff0e800e1c items=0 ppid=2117 pid=2240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:35.555000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Oct 29 04:40:35.559000 audit[2242]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2242 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 04:40:35.559000 audit[2242]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe9d22bb80 a2=0 a3=7ffe9d22bb6c items=0 ppid=2117 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:35.559000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Oct 29 04:40:35.561000 audit[2243]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2243 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 04:40:35.561000 audit[2243]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffef444cb10 a2=0 a3=7ffef444cafc items=0 ppid=2117 pid=2243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:35.561000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Oct 29 04:40:35.566000 audit[2245]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2245 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 04:40:35.566000 audit[2245]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe190dc010 a2=0 a3=7ffe190dbffc items=0 ppid=2117 pid=2245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:35.566000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Oct 29 04:40:35.572000 audit[2248]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2248 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 04:40:35.572000 audit[2248]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffff7b75fb0 a2=0 a3=7ffff7b75f9c items=0 ppid=2117 pid=2248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:35.572000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Oct 29 04:40:35.577000 audit[2251]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2251 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 04:40:35.577000 audit[2251]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffda2658630 a2=0 a3=7ffda265861c items=0 ppid=2117 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:35.577000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Oct 29 04:40:35.579000 audit[2252]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2252 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 04:40:35.579000 audit[2252]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd23475080 a2=0 a3=7ffd2347506c items=0 ppid=2117 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:35.579000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Oct 29 04:40:35.583000 audit[2254]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2254 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 04:40:35.583000 audit[2254]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffcb0483a10 a2=0 a3=7ffcb04839fc items=0 ppid=2117 pid=2254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:35.583000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 29 04:40:35.589000 audit[2257]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2257 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 04:40:35.589000 audit[2257]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7fff15aa6d30 a2=0 a3=7fff15aa6d1c items=0 ppid=2117 pid=2257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:35.589000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Oct 29 04:40:35.591000 audit[2258]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2258 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 04:40:35.591000 audit[2258]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc659ad3f0 a2=0 a3=7ffc659ad3dc items=0 ppid=2117 pid=2258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:35.591000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Oct 29 04:40:35.595000 audit[2260]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2260 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 04:40:35.595000 audit[2260]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffdd1cf8c70 a2=0 a3=7ffdd1cf8c5c items=0 ppid=2117 pid=2260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:35.595000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Oct 29 04:40:35.600000 audit[2261]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2261 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 04:40:35.600000 audit[2261]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdbb7de040 a2=0 a3=7ffdbb7de02c items=0 ppid=2117 pid=2261 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:35.600000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Oct 29 04:40:35.603000 audit[2263]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2263 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 04:40:35.603000 audit[2263]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc7b274b70 a2=0 a3=7ffc7b274b5c items=0 ppid=2117 pid=2263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:35.603000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 29 04:40:35.609000 audit[2266]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2266 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Oct 29 04:40:35.609000 audit[2266]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffed2097740 a2=0 a3=7ffed209772c items=0 ppid=2117 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:35.609000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Oct 29 04:40:35.614000 audit[2268]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2268 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Oct 29 04:40:35.614000 audit[2268]: SYSCALL arch=c000003e syscall=46 success=yes exit=2088 a0=3 a1=7fffe536d310 a2=0 a3=7fffe536d2fc items=0 ppid=2117 pid=2268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:35.614000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 29 04:40:35.615000 audit[2268]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2268 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Oct 29 04:40:35.615000 audit[2268]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7fffe536d310 a2=0 a3=7fffe536d2fc items=0 ppid=2117 pid=2268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:35.615000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 29 04:40:36.571338 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3652856561.mount: Deactivated successfully. Oct 29 04:40:38.156926 env[1204]: time="2025-10-29T04:40:38.156836901Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.38.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 04:40:38.159401 env[1204]: time="2025-10-29T04:40:38.159337144Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:f2c1be207523e593db82e3b8cf356a12f3ad8d1aad2225f8114b2cf9d6486cf1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 04:40:38.161440 env[1204]: time="2025-10-29T04:40:38.161402152Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.38.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 04:40:38.163523 env[1204]: time="2025-10-29T04:40:38.163474311Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:1b629a1403f5b6d7243f7dd523d04b8a50352a33c1d4d6970b6002a8733acf2e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 04:40:38.164466 env[1204]: time="2025-10-29T04:40:38.164420900Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.38.7\" returns image reference \"sha256:f2c1be207523e593db82e3b8cf356a12f3ad8d1aad2225f8114b2cf9d6486cf1\"" Oct 29 04:40:38.173201 env[1204]: time="2025-10-29T04:40:38.173142769Z" level=info msg="CreateContainer within sandbox \"b11528b70327104f46b0e2047e959fa39df05976a0961e9b8651c9128accf7de\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Oct 29 04:40:38.189230 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3588839218.mount: Deactivated successfully. Oct 29 04:40:38.196775 env[1204]: time="2025-10-29T04:40:38.196727730Z" level=info msg="CreateContainer within sandbox \"b11528b70327104f46b0e2047e959fa39df05976a0961e9b8651c9128accf7de\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"4ab68acc3b5b74345aee7eedd16e42b56322516b10f818ea2d90f9eb460bcf67\"" Oct 29 04:40:38.198166 env[1204]: time="2025-10-29T04:40:38.198125456Z" level=info msg="StartContainer for \"4ab68acc3b5b74345aee7eedd16e42b56322516b10f818ea2d90f9eb460bcf67\"" Oct 29 04:40:38.242198 systemd[1]: Started cri-containerd-4ab68acc3b5b74345aee7eedd16e42b56322516b10f818ea2d90f9eb460bcf67.scope. Oct 29 04:40:38.290000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:38.290000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:38.291000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:38.291000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:38.291000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:38.291000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:38.291000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:38.291000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:38.291000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:38.291000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:38.291000 audit: BPF prog-id=114 op=LOAD Oct 29 04:40:38.292000 audit[2277]: AVC avc: denied { bpf } for pid=2277 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:38.292000 audit[2277]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2071 pid=2277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:38.292000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461623638616363336235623734333435616565376565646431366534 Oct 29 04:40:38.293000 audit[2277]: AVC avc: denied { perfmon } for pid=2277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:38.293000 audit[2277]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2071 pid=2277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:38.293000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461623638616363336235623734333435616565376565646431366534 Oct 29 04:40:38.293000 audit[2277]: AVC avc: denied { bpf } for pid=2277 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:38.293000 audit[2277]: AVC avc: denied { bpf } for pid=2277 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:38.293000 audit[2277]: AVC avc: denied { bpf } for pid=2277 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:38.293000 audit[2277]: AVC avc: denied { perfmon } for pid=2277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:38.293000 audit[2277]: AVC avc: denied { perfmon } for pid=2277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:38.293000 audit[2277]: AVC avc: denied { perfmon } for pid=2277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:38.293000 audit[2277]: AVC avc: denied { perfmon } for pid=2277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:38.293000 audit[2277]: AVC avc: denied { perfmon } for pid=2277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:38.293000 audit[2277]: AVC avc: denied { bpf } for pid=2277 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:38.293000 audit[2277]: AVC avc: denied { bpf } for pid=2277 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:38.293000 audit: BPF prog-id=115 op=LOAD Oct 29 04:40:38.293000 audit[2277]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00033b590 items=0 ppid=2071 pid=2277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:38.293000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461623638616363336235623734333435616565376565646431366534 Oct 29 04:40:38.294000 audit[2277]: AVC avc: denied { bpf } for pid=2277 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:38.294000 audit[2277]: AVC avc: denied { bpf } for pid=2277 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:38.294000 audit[2277]: AVC avc: denied { perfmon } for pid=2277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:38.294000 audit[2277]: AVC avc: denied { perfmon } for pid=2277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:38.294000 audit[2277]: AVC avc: denied { perfmon } for pid=2277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:38.294000 audit[2277]: AVC avc: denied { perfmon } for pid=2277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:38.294000 audit[2277]: AVC avc: denied { perfmon } for pid=2277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:38.294000 audit[2277]: AVC avc: denied { bpf } for pid=2277 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:38.294000 audit[2277]: AVC avc: denied { bpf } for pid=2277 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:38.294000 audit: BPF prog-id=116 op=LOAD Oct 29 04:40:38.294000 audit[2277]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00033b5d8 items=0 ppid=2071 pid=2277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:38.294000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461623638616363336235623734333435616565376565646431366534 Oct 29 04:40:38.296000 audit: BPF prog-id=116 op=UNLOAD Oct 29 04:40:38.296000 audit: BPF prog-id=115 op=UNLOAD Oct 29 04:40:38.296000 audit[2277]: AVC avc: denied { bpf } for pid=2277 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:38.296000 audit[2277]: AVC avc: denied { bpf } for pid=2277 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:38.296000 audit[2277]: AVC avc: denied { bpf } for pid=2277 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:38.296000 audit[2277]: AVC avc: denied { perfmon } for pid=2277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:38.296000 audit[2277]: AVC avc: denied { perfmon } for pid=2277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:38.296000 audit[2277]: AVC avc: denied { perfmon } for pid=2277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:38.296000 audit[2277]: AVC avc: denied { perfmon } for pid=2277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:38.296000 audit[2277]: AVC avc: denied { perfmon } for pid=2277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:38.296000 audit[2277]: AVC avc: denied { bpf } for pid=2277 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:38.296000 audit[2277]: AVC avc: denied { bpf } for pid=2277 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:38.296000 audit: BPF prog-id=117 op=LOAD Oct 29 04:40:38.296000 audit[2277]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00033b9e8 items=0 ppid=2071 pid=2277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:38.296000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461623638616363336235623734333435616565376565646431366534 Oct 29 04:40:38.333035 env[1204]: time="2025-10-29T04:40:38.332966890Z" level=info msg="StartContainer for \"4ab68acc3b5b74345aee7eedd16e42b56322516b10f818ea2d90f9eb460bcf67\" returns successfully" Oct 29 04:40:38.367626 kubelet[1975]: I1029 04:40:38.367199 1975 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-xfvq4" podStartSLOduration=5.367092211 podStartE2EDuration="5.367092211s" podCreationTimestamp="2025-10-29 04:40:33 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-10-29 04:40:35.365518377 +0000 UTC m=+6.530586311" watchObservedRunningTime="2025-10-29 04:40:38.367092211 +0000 UTC m=+9.532160149" Oct 29 04:40:39.566242 kubelet[1975]: I1029 04:40:39.566055 1975 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="tigera-operator/tigera-operator-7dcd859c48-fwfbp" podStartSLOduration=2.086933562 podStartE2EDuration="5.566031617s" podCreationTimestamp="2025-10-29 04:40:34 +0000 UTC" firstStartedPulling="2025-10-29 04:40:34.687877639 +0000 UTC m=+5.852945570" lastFinishedPulling="2025-10-29 04:40:38.166975687 +0000 UTC m=+9.332043625" observedRunningTime="2025-10-29 04:40:38.369292421 +0000 UTC m=+9.534360363" watchObservedRunningTime="2025-10-29 04:40:39.566031617 +0000 UTC m=+10.731099555" Oct 29 04:40:46.284997 sudo[1359]: pam_unix(sudo:session): session closed for user root Oct 29 04:40:46.295492 kernel: kauditd_printk_skb: 357 callbacks suppressed Oct 29 04:40:46.295756 kernel: audit: type=1106 audit(1761712846.287:930): pid=1359 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 29 04:40:46.287000 audit[1359]: USER_END pid=1359 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 29 04:40:46.287000 audit[1359]: CRED_DISP pid=1359 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 29 04:40:46.303468 kernel: audit: type=1104 audit(1761712846.287:931): pid=1359 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Oct 29 04:40:46.452004 sshd[1356]: pam_unix(sshd:session): session closed for user core Oct 29 04:40:46.473718 kernel: audit: type=1106 audit(1761712846.460:932): pid=1356 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:40:46.460000 audit[1356]: USER_END pid=1356 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:40:46.470512 systemd[1]: sshd@7-10.230.43.230:22-147.75.109.163:35024.service: Deactivated successfully. Oct 29 04:40:46.485141 kernel: audit: type=1104 audit(1761712846.460:933): pid=1356 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:40:46.460000 audit[1356]: CRED_DISP pid=1356 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:40:46.473352 systemd[1]: session-7.scope: Deactivated successfully. Oct 29 04:40:46.474691 systemd[1]: session-7.scope: Consumed 7.190s CPU time. Oct 29 04:40:46.500281 kernel: audit: type=1131 audit(1761712846.469:934): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.230.43.230:22-147.75.109.163:35024 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:40:46.469000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.230.43.230:22-147.75.109.163:35024 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:40:46.490467 systemd-logind[1188]: Session 7 logged out. Waiting for processes to exit. Oct 29 04:40:46.504120 systemd-logind[1188]: Removed session 7. Oct 29 04:40:47.754000 audit[2360]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=2360 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 29 04:40:47.767908 kernel: audit: type=1325 audit(1761712847.754:935): table=filter:89 family=2 entries=15 op=nft_register_rule pid=2360 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 29 04:40:47.768031 kernel: audit: type=1300 audit(1761712847.754:935): arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7fff7f411cc0 a2=0 a3=7fff7f411cac items=0 ppid=2117 pid=2360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:47.754000 audit[2360]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7fff7f411cc0 a2=0 a3=7fff7f411cac items=0 ppid=2117 pid=2360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:47.754000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 29 04:40:47.778776 kernel: audit: type=1327 audit(1761712847.754:935): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 29 04:40:47.771000 audit[2360]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2360 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 29 04:40:47.786774 kernel: audit: type=1325 audit(1761712847.771:936): table=nat:90 family=2 entries=12 op=nft_register_rule pid=2360 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 29 04:40:47.771000 audit[2360]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fff7f411cc0 a2=0 a3=0 items=0 ppid=2117 pid=2360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:47.794629 kernel: audit: type=1300 audit(1761712847.771:936): arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fff7f411cc0 a2=0 a3=0 items=0 ppid=2117 pid=2360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:47.771000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 29 04:40:47.836000 audit[2362]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=2362 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 29 04:40:47.836000 audit[2362]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7fff94ad2f60 a2=0 a3=7fff94ad2f4c items=0 ppid=2117 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:47.836000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 29 04:40:47.848000 audit[2362]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2362 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 29 04:40:47.848000 audit[2362]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fff94ad2f60 a2=0 a3=0 items=0 ppid=2117 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:47.848000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 29 04:40:47.964266 systemd[1]: Started sshd@8-10.230.43.230:22-178.128.241.223:51276.service. Oct 29 04:40:47.965000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.230.43.230:22-178.128.241.223:51276 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:40:48.093942 sshd[2364]: Invalid user admin from 178.128.241.223 port 51276 Oct 29 04:40:48.119795 sshd[2364]: pam_faillock(sshd:auth): User unknown Oct 29 04:40:48.121078 sshd[2364]: pam_unix(sshd:auth): check pass; user unknown Oct 29 04:40:48.121196 sshd[2364]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.241.223 Oct 29 04:40:48.122105 sshd[2364]: pam_faillock(sshd:auth): User unknown Oct 29 04:40:48.121000 audit[2364]: USER_AUTH pid=2364 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="admin" exe="/usr/sbin/sshd" hostname=178.128.241.223 addr=178.128.241.223 terminal=ssh res=failed' Oct 29 04:40:50.312179 sshd[2364]: Failed password for invalid user admin from 178.128.241.223 port 51276 ssh2 Oct 29 04:40:50.990000 audit[2370]: NETFILTER_CFG table=filter:93 family=2 entries=17 op=nft_register_rule pid=2370 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 29 04:40:50.990000 audit[2370]: SYSCALL arch=c000003e syscall=46 success=yes exit=6736 a0=3 a1=7ffc61a8c850 a2=0 a3=7ffc61a8c83c items=0 ppid=2117 pid=2370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:50.990000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 29 04:40:51.010000 audit[2370]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2370 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 29 04:40:51.010000 audit[2370]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffc61a8c850 a2=0 a3=0 items=0 ppid=2117 pid=2370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:51.010000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 29 04:40:51.045000 audit[2372]: NETFILTER_CFG table=filter:95 family=2 entries=18 op=nft_register_rule pid=2372 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 29 04:40:51.045000 audit[2372]: SYSCALL arch=c000003e syscall=46 success=yes exit=6736 a0=3 a1=7ffeca5b3e10 a2=0 a3=7ffeca5b3dfc items=0 ppid=2117 pid=2372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:51.045000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 29 04:40:51.051000 audit[2372]: NETFILTER_CFG table=nat:96 family=2 entries=12 op=nft_register_rule pid=2372 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 29 04:40:51.051000 audit[2372]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffeca5b3e10 a2=0 a3=0 items=0 ppid=2117 pid=2372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:51.051000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 29 04:40:52.118038 kernel: kauditd_printk_skb: 21 callbacks suppressed Oct 29 04:40:52.118585 kernel: audit: type=1325 audit(1761712852.110:945): table=filter:97 family=2 entries=19 op=nft_register_rule pid=2374 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 29 04:40:52.110000 audit[2374]: NETFILTER_CFG table=filter:97 family=2 entries=19 op=nft_register_rule pid=2374 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 29 04:40:52.110000 audit[2374]: SYSCALL arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7ffec1007590 a2=0 a3=7ffec100757c items=0 ppid=2117 pid=2374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:52.127624 kernel: audit: type=1300 audit(1761712852.110:945): arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7ffec1007590 a2=0 a3=7ffec100757c items=0 ppid=2117 pid=2374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:52.110000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 29 04:40:52.132666 kernel: audit: type=1327 audit(1761712852.110:945): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 29 04:40:52.126000 audit[2374]: NETFILTER_CFG table=nat:98 family=2 entries=12 op=nft_register_rule pid=2374 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 29 04:40:52.144156 kernel: audit: type=1325 audit(1761712852.126:946): table=nat:98 family=2 entries=12 op=nft_register_rule pid=2374 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 29 04:40:52.144270 kernel: audit: type=1300 audit(1761712852.126:946): arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffec1007590 a2=0 a3=0 items=0 ppid=2117 pid=2374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:52.126000 audit[2374]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffec1007590 a2=0 a3=0 items=0 ppid=2117 pid=2374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:52.126000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 29 04:40:52.149624 kernel: audit: type=1327 audit(1761712852.126:946): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 29 04:40:52.287084 sshd[2364]: Connection closed by invalid user admin 178.128.241.223 port 51276 [preauth] Oct 29 04:40:52.290078 systemd[1]: sshd@8-10.230.43.230:22-178.128.241.223:51276.service: Deactivated successfully. Oct 29 04:40:52.289000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.230.43.230:22-178.128.241.223:51276 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:40:52.298008 kernel: audit: type=1131 audit(1761712852.289:947): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.230.43.230:22-178.128.241.223:51276 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:40:53.352000 audit[2377]: NETFILTER_CFG table=filter:99 family=2 entries=21 op=nft_register_rule pid=2377 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 29 04:40:53.361630 kernel: audit: type=1325 audit(1761712853.352:948): table=filter:99 family=2 entries=21 op=nft_register_rule pid=2377 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 29 04:40:53.352000 audit[2377]: SYSCALL arch=c000003e syscall=46 success=yes exit=8224 a0=3 a1=7ffd34a2b7b0 a2=0 a3=7ffd34a2b79c items=0 ppid=2117 pid=2377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:53.352000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 29 04:40:53.373074 kernel: audit: type=1300 audit(1761712853.352:948): arch=c000003e syscall=46 success=yes exit=8224 a0=3 a1=7ffd34a2b7b0 a2=0 a3=7ffd34a2b79c items=0 ppid=2117 pid=2377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:53.373284 kernel: audit: type=1327 audit(1761712853.352:948): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 29 04:40:53.374000 audit[2377]: NETFILTER_CFG table=nat:100 family=2 entries=12 op=nft_register_rule pid=2377 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 29 04:40:53.374000 audit[2377]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffd34a2b7b0 a2=0 a3=0 items=0 ppid=2117 pid=2377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:53.374000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 29 04:40:53.430356 systemd[1]: Created slice kubepods-besteffort-pod0619562a_10ea_4f3a_b2da_863879ce6d2b.slice. Oct 29 04:40:53.489079 kubelet[1975]: I1029 04:40:53.488972 1975 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-t9tbp\" (UniqueName: \"kubernetes.io/projected/0619562a-10ea-4f3a-b2da-863879ce6d2b-kube-api-access-t9tbp\") pod \"calico-typha-6694978bf-km6k2\" (UID: \"0619562a-10ea-4f3a-b2da-863879ce6d2b\") " pod="calico-system/calico-typha-6694978bf-km6k2" Oct 29 04:40:53.490201 kubelet[1975]: I1029 04:40:53.490155 1975 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/0619562a-10ea-4f3a-b2da-863879ce6d2b-tigera-ca-bundle\") pod \"calico-typha-6694978bf-km6k2\" (UID: \"0619562a-10ea-4f3a-b2da-863879ce6d2b\") " pod="calico-system/calico-typha-6694978bf-km6k2" Oct 29 04:40:53.490492 kubelet[1975]: I1029 04:40:53.490429 1975 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/0619562a-10ea-4f3a-b2da-863879ce6d2b-typha-certs\") pod \"calico-typha-6694978bf-km6k2\" (UID: \"0619562a-10ea-4f3a-b2da-863879ce6d2b\") " pod="calico-system/calico-typha-6694978bf-km6k2" Oct 29 04:40:53.678591 systemd[1]: Created slice kubepods-besteffort-pod61e0f36f_8ff5_4eef_830e_21123b4f595a.slice. Oct 29 04:40:53.737708 env[1204]: time="2025-10-29T04:40:53.736829739Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-6694978bf-km6k2,Uid:0619562a-10ea-4f3a-b2da-863879ce6d2b,Namespace:calico-system,Attempt:0,}" Oct 29 04:40:53.786899 env[1204]: time="2025-10-29T04:40:53.786558531Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 29 04:40:53.787261 env[1204]: time="2025-10-29T04:40:53.787170743Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 29 04:40:53.787662 env[1204]: time="2025-10-29T04:40:53.787571037Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 29 04:40:53.789763 env[1204]: time="2025-10-29T04:40:53.788850956Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/cb203f3ac7e7dacdb9872a7a2975ee9c70c4e59a8adeec47c8d59a640d4f352c pid=2387 runtime=io.containerd.runc.v2 Oct 29 04:40:53.792804 kubelet[1975]: I1029 04:40:53.792708 1975 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/61e0f36f-8ff5-4eef-830e-21123b4f595a-lib-modules\") pod \"calico-node-2snls\" (UID: \"61e0f36f-8ff5-4eef-830e-21123b4f595a\") " pod="calico-system/calico-node-2snls" Oct 29 04:40:53.792804 kubelet[1975]: I1029 04:40:53.792780 1975 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-b4wjv\" (UniqueName: \"kubernetes.io/projected/61e0f36f-8ff5-4eef-830e-21123b4f595a-kube-api-access-b4wjv\") pod \"calico-node-2snls\" (UID: \"61e0f36f-8ff5-4eef-830e-21123b4f595a\") " pod="calico-system/calico-node-2snls" Oct 29 04:40:53.793006 kubelet[1975]: I1029 04:40:53.792824 1975 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/61e0f36f-8ff5-4eef-830e-21123b4f595a-var-lib-calico\") pod \"calico-node-2snls\" (UID: \"61e0f36f-8ff5-4eef-830e-21123b4f595a\") " pod="calico-system/calico-node-2snls" Oct 29 04:40:53.793006 kubelet[1975]: I1029 04:40:53.792864 1975 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/61e0f36f-8ff5-4eef-830e-21123b4f595a-cni-log-dir\") pod \"calico-node-2snls\" (UID: \"61e0f36f-8ff5-4eef-830e-21123b4f595a\") " pod="calico-system/calico-node-2snls" Oct 29 04:40:53.793006 kubelet[1975]: I1029 04:40:53.792914 1975 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/61e0f36f-8ff5-4eef-830e-21123b4f595a-xtables-lock\") pod \"calico-node-2snls\" (UID: \"61e0f36f-8ff5-4eef-830e-21123b4f595a\") " pod="calico-system/calico-node-2snls" Oct 29 04:40:53.793006 kubelet[1975]: I1029 04:40:53.792946 1975 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/61e0f36f-8ff5-4eef-830e-21123b4f595a-flexvol-driver-host\") pod \"calico-node-2snls\" (UID: \"61e0f36f-8ff5-4eef-830e-21123b4f595a\") " pod="calico-system/calico-node-2snls" Oct 29 04:40:53.793269 kubelet[1975]: I1029 04:40:53.793002 1975 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/61e0f36f-8ff5-4eef-830e-21123b4f595a-node-certs\") pod \"calico-node-2snls\" (UID: \"61e0f36f-8ff5-4eef-830e-21123b4f595a\") " pod="calico-system/calico-node-2snls" Oct 29 04:40:53.793269 kubelet[1975]: I1029 04:40:53.793061 1975 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/61e0f36f-8ff5-4eef-830e-21123b4f595a-policysync\") pod \"calico-node-2snls\" (UID: \"61e0f36f-8ff5-4eef-830e-21123b4f595a\") " pod="calico-system/calico-node-2snls" Oct 29 04:40:53.793269 kubelet[1975]: I1029 04:40:53.793112 1975 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/61e0f36f-8ff5-4eef-830e-21123b4f595a-cni-net-dir\") pod \"calico-node-2snls\" (UID: \"61e0f36f-8ff5-4eef-830e-21123b4f595a\") " pod="calico-system/calico-node-2snls" Oct 29 04:40:53.793269 kubelet[1975]: I1029 04:40:53.793156 1975 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/61e0f36f-8ff5-4eef-830e-21123b4f595a-var-run-calico\") pod \"calico-node-2snls\" (UID: \"61e0f36f-8ff5-4eef-830e-21123b4f595a\") " pod="calico-system/calico-node-2snls" Oct 29 04:40:53.793269 kubelet[1975]: I1029 04:40:53.793193 1975 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/61e0f36f-8ff5-4eef-830e-21123b4f595a-cni-bin-dir\") pod \"calico-node-2snls\" (UID: \"61e0f36f-8ff5-4eef-830e-21123b4f595a\") " pod="calico-system/calico-node-2snls" Oct 29 04:40:53.793822 kubelet[1975]: I1029 04:40:53.793240 1975 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/61e0f36f-8ff5-4eef-830e-21123b4f595a-tigera-ca-bundle\") pod \"calico-node-2snls\" (UID: \"61e0f36f-8ff5-4eef-830e-21123b4f595a\") " pod="calico-system/calico-node-2snls" Oct 29 04:40:53.840461 systemd[1]: Started cri-containerd-cb203f3ac7e7dacdb9872a7a2975ee9c70c4e59a8adeec47c8d59a640d4f352c.scope. Oct 29 04:40:53.904865 kubelet[1975]: E1029 04:40:53.904720 1975 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-d8hbp" podUID="78135185-6b36-431d-89d1-d452e0f3a516" Oct 29 04:40:53.912400 kubelet[1975]: E1029 04:40:53.912352 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 04:40:53.912591 kubelet[1975]: W1029 04:40:53.912559 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 04:40:53.913541 kubelet[1975]: E1029 04:40:53.913498 1975 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 04:40:53.926813 kubelet[1975]: E1029 04:40:53.926740 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 04:40:53.926813 kubelet[1975]: W1029 04:40:53.926803 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 04:40:53.927111 kubelet[1975]: E1029 04:40:53.926834 1975 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 04:40:53.960000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:53.960000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:53.960000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:53.960000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:53.960000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:53.960000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:53.960000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:53.960000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:53.960000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:53.961000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:53.961000 audit: BPF prog-id=118 op=LOAD Oct 29 04:40:53.963000 audit[2397]: AVC avc: denied { bpf } for pid=2397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:53.963000 audit[2397]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2387 pid=2397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:53.963000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362323033663361633765376461636462393837326137613239373565 Oct 29 04:40:53.963000 audit[2397]: AVC avc: denied { perfmon } for pid=2397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:53.963000 audit[2397]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2387 pid=2397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:53.963000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362323033663361633765376461636462393837326137613239373565 Oct 29 04:40:53.966559 kubelet[1975]: E1029 04:40:53.964493 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 04:40:53.966559 kubelet[1975]: W1029 04:40:53.964536 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 04:40:53.966559 kubelet[1975]: E1029 04:40:53.964568 1975 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 04:40:53.966559 kubelet[1975]: E1029 04:40:53.964855 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 04:40:53.966559 kubelet[1975]: W1029 04:40:53.964869 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 04:40:53.966559 kubelet[1975]: E1029 04:40:53.964884 1975 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 04:40:53.965000 audit[2397]: AVC avc: denied { bpf } for pid=2397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:53.965000 audit[2397]: AVC avc: denied { bpf } for pid=2397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:53.965000 audit[2397]: AVC avc: denied { bpf } for pid=2397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:53.965000 audit[2397]: AVC avc: denied { perfmon } for pid=2397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:53.965000 audit[2397]: AVC avc: denied { perfmon } for pid=2397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:53.965000 audit[2397]: AVC avc: denied { perfmon } for pid=2397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:53.965000 audit[2397]: AVC avc: denied { perfmon } for pid=2397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:53.965000 audit[2397]: AVC avc: denied { perfmon } for pid=2397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:53.965000 audit[2397]: AVC avc: denied { bpf } for pid=2397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:53.965000 audit[2397]: AVC avc: denied { bpf } for pid=2397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:53.965000 audit: BPF prog-id=119 op=LOAD Oct 29 04:40:53.965000 audit[2397]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001d9c90 items=0 ppid=2387 pid=2397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:53.965000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362323033663361633765376461636462393837326137613239373565 Oct 29 04:40:53.965000 audit[2397]: AVC avc: denied { bpf } for pid=2397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:53.965000 audit[2397]: AVC avc: denied { bpf } for pid=2397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:53.965000 audit[2397]: AVC avc: denied { perfmon } for pid=2397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:53.965000 audit[2397]: AVC avc: denied { perfmon } for pid=2397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:53.965000 audit[2397]: AVC avc: denied { perfmon } for pid=2397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:53.965000 audit[2397]: AVC avc: denied { perfmon } for pid=2397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:53.965000 audit[2397]: AVC avc: denied { perfmon } for pid=2397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:53.965000 audit[2397]: AVC avc: denied { bpf } for pid=2397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:53.965000 audit[2397]: AVC avc: denied { bpf } for pid=2397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:53.965000 audit: BPF prog-id=120 op=LOAD Oct 29 04:40:53.965000 audit[2397]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001d9cd8 items=0 ppid=2387 pid=2397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:53.965000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362323033663361633765376461636462393837326137613239373565 Oct 29 04:40:53.965000 audit: BPF prog-id=120 op=UNLOAD Oct 29 04:40:53.965000 audit: BPF prog-id=119 op=UNLOAD Oct 29 04:40:53.965000 audit[2397]: AVC avc: denied { bpf } for pid=2397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:53.965000 audit[2397]: AVC avc: denied { bpf } for pid=2397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:53.965000 audit[2397]: AVC avc: denied { bpf } for pid=2397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:53.965000 audit[2397]: AVC avc: denied { perfmon } for pid=2397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:53.965000 audit[2397]: AVC avc: denied { perfmon } for pid=2397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:53.965000 audit[2397]: AVC avc: denied { perfmon } for pid=2397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:53.965000 audit[2397]: AVC avc: denied { perfmon } for pid=2397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:53.965000 audit[2397]: AVC avc: denied { perfmon } for pid=2397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:53.965000 audit[2397]: AVC avc: denied { bpf } for pid=2397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:53.965000 audit[2397]: AVC avc: denied { bpf } for pid=2397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:53.965000 audit: BPF prog-id=121 op=LOAD Oct 29 04:40:53.965000 audit[2397]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003400e8 items=0 ppid=2387 pid=2397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:53.965000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362323033663361633765376461636462393837326137613239373565 Oct 29 04:40:53.971985 kubelet[1975]: E1029 04:40:53.971936 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 04:40:53.971985 kubelet[1975]: W1029 04:40:53.971982 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 04:40:53.972153 kubelet[1975]: E1029 04:40:53.972002 1975 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 04:40:53.972503 kubelet[1975]: E1029 04:40:53.972477 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 04:40:53.972503 kubelet[1975]: W1029 04:40:53.972498 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 04:40:53.972698 kubelet[1975]: E1029 04:40:53.972523 1975 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 04:40:53.977091 kubelet[1975]: E1029 04:40:53.977034 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 04:40:53.977091 kubelet[1975]: W1029 04:40:53.977056 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 04:40:53.977091 kubelet[1975]: E1029 04:40:53.977074 1975 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 04:40:53.977753 kubelet[1975]: E1029 04:40:53.977729 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 04:40:53.977753 kubelet[1975]: W1029 04:40:53.977750 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 04:40:53.977965 kubelet[1975]: E1029 04:40:53.977777 1975 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 04:40:53.978079 kubelet[1975]: E1029 04:40:53.978055 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 04:40:53.978079 kubelet[1975]: W1029 04:40:53.978075 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 04:40:53.978234 kubelet[1975]: E1029 04:40:53.978091 1975 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 04:40:53.978390 kubelet[1975]: E1029 04:40:53.978352 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 04:40:53.978390 kubelet[1975]: W1029 04:40:53.978379 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 04:40:53.978591 kubelet[1975]: E1029 04:40:53.978395 1975 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 04:40:53.982778 kubelet[1975]: E1029 04:40:53.982740 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 04:40:53.982778 kubelet[1975]: W1029 04:40:53.982773 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 04:40:53.982944 kubelet[1975]: E1029 04:40:53.982792 1975 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 04:40:53.983128 kubelet[1975]: E1029 04:40:53.983092 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 04:40:53.983128 kubelet[1975]: W1029 04:40:53.983113 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 04:40:53.983128 kubelet[1975]: E1029 04:40:53.983130 1975 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 04:40:53.983412 kubelet[1975]: E1029 04:40:53.983386 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 04:40:53.983412 kubelet[1975]: W1029 04:40:53.983407 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 04:40:53.983576 kubelet[1975]: E1029 04:40:53.983423 1975 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 04:40:53.983725 kubelet[1975]: E1029 04:40:53.983704 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 04:40:53.983725 kubelet[1975]: W1029 04:40:53.983722 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 04:40:53.983867 kubelet[1975]: E1029 04:40:53.983735 1975 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 04:40:53.984044 kubelet[1975]: E1029 04:40:53.984019 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 04:40:53.984044 kubelet[1975]: W1029 04:40:53.984039 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 04:40:53.984170 kubelet[1975]: E1029 04:40:53.984082 1975 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 04:40:53.984343 kubelet[1975]: E1029 04:40:53.984319 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 04:40:53.984343 kubelet[1975]: W1029 04:40:53.984339 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 04:40:53.984512 kubelet[1975]: E1029 04:40:53.984355 1975 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 04:40:53.984657 kubelet[1975]: E1029 04:40:53.984595 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 04:40:53.984657 kubelet[1975]: W1029 04:40:53.984622 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 04:40:53.984791 kubelet[1975]: E1029 04:40:53.984662 1975 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 04:40:53.984970 kubelet[1975]: E1029 04:40:53.984870 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 04:40:53.984970 kubelet[1975]: W1029 04:40:53.984889 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 04:40:53.984970 kubelet[1975]: E1029 04:40:53.984908 1975 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 04:40:53.985251 kubelet[1975]: E1029 04:40:53.985205 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 04:40:53.985251 kubelet[1975]: W1029 04:40:53.985225 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 04:40:53.985251 kubelet[1975]: E1029 04:40:53.985251 1975 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 04:40:53.985512 kubelet[1975]: E1029 04:40:53.985487 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 04:40:53.985512 kubelet[1975]: W1029 04:40:53.985507 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 04:40:53.985695 kubelet[1975]: E1029 04:40:53.985522 1975 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 04:40:53.985838 kubelet[1975]: E1029 04:40:53.985814 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 04:40:53.985838 kubelet[1975]: W1029 04:40:53.985833 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 04:40:53.986004 kubelet[1975]: E1029 04:40:53.985850 1975 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 04:40:53.986152 kubelet[1975]: E1029 04:40:53.986114 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 04:40:53.986152 kubelet[1975]: W1029 04:40:53.986133 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 04:40:53.986152 kubelet[1975]: E1029 04:40:53.986149 1975 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 04:40:53.989494 env[1204]: time="2025-10-29T04:40:53.989408274Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-2snls,Uid:61e0f36f-8ff5-4eef-830e-21123b4f595a,Namespace:calico-system,Attempt:0,}" Oct 29 04:40:53.996656 kubelet[1975]: E1029 04:40:53.996087 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 04:40:53.996656 kubelet[1975]: W1029 04:40:53.996114 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 04:40:53.996656 kubelet[1975]: E1029 04:40:53.996136 1975 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 04:40:53.996656 kubelet[1975]: I1029 04:40:53.996177 1975 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/78135185-6b36-431d-89d1-d452e0f3a516-varrun\") pod \"csi-node-driver-d8hbp\" (UID: \"78135185-6b36-431d-89d1-d452e0f3a516\") " pod="calico-system/csi-node-driver-d8hbp" Oct 29 04:40:53.996656 kubelet[1975]: E1029 04:40:53.996514 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 04:40:53.996656 kubelet[1975]: W1029 04:40:53.996530 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 04:40:53.996656 kubelet[1975]: E1029 04:40:53.996547 1975 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 04:40:53.996656 kubelet[1975]: I1029 04:40:53.996579 1975 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/78135185-6b36-431d-89d1-d452e0f3a516-socket-dir\") pod \"csi-node-driver-d8hbp\" (UID: \"78135185-6b36-431d-89d1-d452e0f3a516\") " pod="calico-system/csi-node-driver-d8hbp" Oct 29 04:40:53.997577 kubelet[1975]: E1029 04:40:53.997494 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 04:40:53.997577 kubelet[1975]: W1029 04:40:53.997560 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 04:40:53.998208 kubelet[1975]: E1029 04:40:53.997588 1975 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 04:40:53.998739 kubelet[1975]: E1029 04:40:53.998707 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 04:40:53.998739 kubelet[1975]: W1029 04:40:53.998730 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 04:40:53.999534 kubelet[1975]: E1029 04:40:53.999497 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 04:40:53.999534 kubelet[1975]: W1029 04:40:53.999519 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 04:40:54.000049 kubelet[1975]: E1029 04:40:53.999813 1975 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 04:40:54.000049 kubelet[1975]: E1029 04:40:53.999872 1975 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 04:40:54.000049 kubelet[1975]: I1029 04:40:53.999903 1975 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-h67bl\" (UniqueName: \"kubernetes.io/projected/78135185-6b36-431d-89d1-d452e0f3a516-kube-api-access-h67bl\") pod \"csi-node-driver-d8hbp\" (UID: \"78135185-6b36-431d-89d1-d452e0f3a516\") " pod="calico-system/csi-node-driver-d8hbp" Oct 29 04:40:54.000233 kubelet[1975]: E1029 04:40:54.000110 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 04:40:54.000233 kubelet[1975]: W1029 04:40:54.000124 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 04:40:54.000233 kubelet[1975]: E1029 04:40:54.000148 1975 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 04:40:54.000409 kubelet[1975]: E1029 04:40:54.000399 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 04:40:54.000489 kubelet[1975]: W1029 04:40:54.000412 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 04:40:54.000489 kubelet[1975]: E1029 04:40:54.000439 1975 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 04:40:54.001827 kubelet[1975]: E1029 04:40:54.001794 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 04:40:54.001918 kubelet[1975]: W1029 04:40:54.001814 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 04:40:54.001918 kubelet[1975]: E1029 04:40:54.001883 1975 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 04:40:54.002216 kubelet[1975]: I1029 04:40:54.001923 1975 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/78135185-6b36-431d-89d1-d452e0f3a516-kubelet-dir\") pod \"csi-node-driver-d8hbp\" (UID: \"78135185-6b36-431d-89d1-d452e0f3a516\") " pod="calico-system/csi-node-driver-d8hbp" Oct 29 04:40:54.004816 kubelet[1975]: E1029 04:40:54.004787 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 04:40:54.004816 kubelet[1975]: W1029 04:40:54.004811 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 04:40:54.005024 kubelet[1975]: E1029 04:40:54.004837 1975 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 04:40:54.005408 kubelet[1975]: E1029 04:40:54.005382 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 04:40:54.005408 kubelet[1975]: W1029 04:40:54.005404 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 04:40:54.012891 kubelet[1975]: E1029 04:40:54.005580 1975 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 04:40:54.012891 kubelet[1975]: E1029 04:40:54.011311 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 04:40:54.012891 kubelet[1975]: W1029 04:40:54.011331 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 04:40:54.012891 kubelet[1975]: E1029 04:40:54.011587 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 04:40:54.012891 kubelet[1975]: W1029 04:40:54.011622 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 04:40:54.012891 kubelet[1975]: E1029 04:40:54.011642 1975 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 04:40:54.012891 kubelet[1975]: E1029 04:40:54.011878 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 04:40:54.012891 kubelet[1975]: W1029 04:40:54.011909 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 04:40:54.012891 kubelet[1975]: E1029 04:40:54.011926 1975 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 04:40:54.012891 kubelet[1975]: E1029 04:40:54.011952 1975 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 04:40:54.013977 kubelet[1975]: I1029 04:40:54.012008 1975 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/78135185-6b36-431d-89d1-d452e0f3a516-registration-dir\") pod \"csi-node-driver-d8hbp\" (UID: \"78135185-6b36-431d-89d1-d452e0f3a516\") " pod="calico-system/csi-node-driver-d8hbp" Oct 29 04:40:54.014322 kubelet[1975]: E1029 04:40:54.014148 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 04:40:54.014322 kubelet[1975]: W1029 04:40:54.014169 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 04:40:54.014322 kubelet[1975]: E1029 04:40:54.014186 1975 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 04:40:54.021006 kubelet[1975]: E1029 04:40:54.020355 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 04:40:54.021006 kubelet[1975]: W1029 04:40:54.020476 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 04:40:54.021006 kubelet[1975]: E1029 04:40:54.020677 1975 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 04:40:54.028036 env[1204]: time="2025-10-29T04:40:54.027889553Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 29 04:40:54.028036 env[1204]: time="2025-10-29T04:40:54.027959312Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 29 04:40:54.028036 env[1204]: time="2025-10-29T04:40:54.027989505Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 29 04:40:54.028470 env[1204]: time="2025-10-29T04:40:54.028217849Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/561f6f6f6a1fd1641f18c74ac0ce4f2879ece3bee43710f2292f56784a3e69fa pid=2460 runtime=io.containerd.runc.v2 Oct 29 04:40:54.098881 systemd[1]: Started cri-containerd-561f6f6f6a1fd1641f18c74ac0ce4f2879ece3bee43710f2292f56784a3e69fa.scope. Oct 29 04:40:54.115845 kubelet[1975]: E1029 04:40:54.115780 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 04:40:54.115845 kubelet[1975]: W1029 04:40:54.115831 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 04:40:54.116208 kubelet[1975]: E1029 04:40:54.115916 1975 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 04:40:54.116570 kubelet[1975]: E1029 04:40:54.116502 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 04:40:54.116570 kubelet[1975]: W1029 04:40:54.116528 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 04:40:54.116570 kubelet[1975]: E1029 04:40:54.116555 1975 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 04:40:54.119820 kubelet[1975]: E1029 04:40:54.119750 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 04:40:54.119820 kubelet[1975]: W1029 04:40:54.119792 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 04:40:54.119820 kubelet[1975]: E1029 04:40:54.119823 1975 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 04:40:54.120473 kubelet[1975]: E1029 04:40:54.120442 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 04:40:54.120473 kubelet[1975]: W1029 04:40:54.120464 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 04:40:54.120796 kubelet[1975]: E1029 04:40:54.120695 1975 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 04:40:54.120915 kubelet[1975]: E1029 04:40:54.120887 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 04:40:54.120915 kubelet[1975]: W1029 04:40:54.120908 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 04:40:54.121390 kubelet[1975]: E1029 04:40:54.121134 1975 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 04:40:54.123743 kubelet[1975]: E1029 04:40:54.123695 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 04:40:54.123743 kubelet[1975]: W1029 04:40:54.123733 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 04:40:54.124162 kubelet[1975]: E1029 04:40:54.123951 1975 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 04:40:54.124392 kubelet[1975]: E1029 04:40:54.124354 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 04:40:54.124392 kubelet[1975]: W1029 04:40:54.124390 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 04:40:54.124663 kubelet[1975]: E1029 04:40:54.124580 1975 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 04:40:54.124916 kubelet[1975]: E1029 04:40:54.124883 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 04:40:54.124916 kubelet[1975]: W1029 04:40:54.124909 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 04:40:54.125387 kubelet[1975]: E1029 04:40:54.125141 1975 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 04:40:54.127932 kubelet[1975]: E1029 04:40:54.126722 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 04:40:54.127932 kubelet[1975]: W1029 04:40:54.126744 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 04:40:54.127932 kubelet[1975]: E1029 04:40:54.126845 1975 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 04:40:54.127932 kubelet[1975]: E1029 04:40:54.127100 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 04:40:54.127932 kubelet[1975]: W1029 04:40:54.127115 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 04:40:54.127932 kubelet[1975]: E1029 04:40:54.127251 1975 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 04:40:54.127932 kubelet[1975]: E1029 04:40:54.127451 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 04:40:54.127932 kubelet[1975]: W1029 04:40:54.127468 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 04:40:54.127932 kubelet[1975]: E1029 04:40:54.127583 1975 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 04:40:54.127932 kubelet[1975]: E1029 04:40:54.127759 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 04:40:54.128660 kubelet[1975]: W1029 04:40:54.127774 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 04:40:54.128660 kubelet[1975]: E1029 04:40:54.127899 1975 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 04:40:54.129940 kubelet[1975]: E1029 04:40:54.128911 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 04:40:54.129940 kubelet[1975]: W1029 04:40:54.128935 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 04:40:54.129940 kubelet[1975]: E1029 04:40:54.129112 1975 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 04:40:54.129940 kubelet[1975]: E1029 04:40:54.129312 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 04:40:54.129940 kubelet[1975]: W1029 04:40:54.129326 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 04:40:54.129940 kubelet[1975]: E1029 04:40:54.129476 1975 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 04:40:54.129940 kubelet[1975]: E1029 04:40:54.129693 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 04:40:54.129940 kubelet[1975]: W1029 04:40:54.129708 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 04:40:54.129940 kubelet[1975]: E1029 04:40:54.129823 1975 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 04:40:54.134636 kubelet[1975]: E1029 04:40:54.134156 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 04:40:54.134636 kubelet[1975]: W1029 04:40:54.134192 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 04:40:54.134636 kubelet[1975]: E1029 04:40:54.134411 1975 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 04:40:54.135341 kubelet[1975]: E1029 04:40:54.135143 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 04:40:54.135341 kubelet[1975]: W1029 04:40:54.135162 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 04:40:54.135341 kubelet[1975]: E1029 04:40:54.135296 1975 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 04:40:54.135944 kubelet[1975]: E1029 04:40:54.135744 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 04:40:54.135944 kubelet[1975]: W1029 04:40:54.135763 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 04:40:54.135944 kubelet[1975]: E1029 04:40:54.135891 1975 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 04:40:54.136661 kubelet[1975]: E1029 04:40:54.136234 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 04:40:54.136661 kubelet[1975]: W1029 04:40:54.136253 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 04:40:54.136853 kubelet[1975]: E1029 04:40:54.136825 1975 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 04:40:54.137121 kubelet[1975]: E1029 04:40:54.137098 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 04:40:54.137256 kubelet[1975]: W1029 04:40:54.137230 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 04:40:54.137755 kubelet[1975]: E1029 04:40:54.137730 1975 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 04:40:54.138052 kubelet[1975]: E1029 04:40:54.137997 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 04:40:54.138228 kubelet[1975]: W1029 04:40:54.138169 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 04:40:54.138551 kubelet[1975]: E1029 04:40:54.138527 1975 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 04:40:54.140733 kubelet[1975]: E1029 04:40:54.140708 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 04:40:54.140921 kubelet[1975]: W1029 04:40:54.140882 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 04:40:54.141228 kubelet[1975]: E1029 04:40:54.141196 1975 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 04:40:54.141451 kubelet[1975]: E1029 04:40:54.141429 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 04:40:54.141592 kubelet[1975]: W1029 04:40:54.141566 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 04:40:54.141929 kubelet[1975]: E1029 04:40:54.141904 1975 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 04:40:54.142186 kubelet[1975]: E1029 04:40:54.142164 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 04:40:54.142327 kubelet[1975]: W1029 04:40:54.142301 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 04:40:54.142492 kubelet[1975]: E1029 04:40:54.142466 1975 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 04:40:54.143295 kubelet[1975]: E1029 04:40:54.143271 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 04:40:54.143469 kubelet[1975]: W1029 04:40:54.143428 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 04:40:54.143598 kubelet[1975]: E1029 04:40:54.143569 1975 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 04:40:54.164518 kubelet[1975]: E1029 04:40:54.164466 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 04:40:54.164867 kubelet[1975]: W1029 04:40:54.164828 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 04:40:54.165130 kubelet[1975]: E1029 04:40:54.165080 1975 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 04:40:54.170277 env[1204]: time="2025-10-29T04:40:54.170206229Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-6694978bf-km6k2,Uid:0619562a-10ea-4f3a-b2da-863879ce6d2b,Namespace:calico-system,Attempt:0,} returns sandbox id \"cb203f3ac7e7dacdb9872a7a2975ee9c70c4e59a8adeec47c8d59a640d4f352c\"" Oct 29 04:40:54.176478 env[1204]: time="2025-10-29T04:40:54.176390077Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.30.4\"" Oct 29 04:40:54.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:54.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:54.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:54.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:54.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:54.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:54.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:54.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:54.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:54.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:54.218000 audit: BPF prog-id=122 op=LOAD Oct 29 04:40:54.226000 audit[2471]: AVC avc: denied { bpf } for pid=2471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:54.226000 audit[2471]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001c5c48 a2=10 a3=1c items=0 ppid=2460 pid=2471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:54.226000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536316636663666366131666431363431663138633734616330636534 Oct 29 04:40:54.227000 audit[2471]: AVC avc: denied { perfmon } for pid=2471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:54.227000 audit[2471]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001c56b0 a2=3c a3=c items=0 ppid=2460 pid=2471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:54.227000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536316636663666366131666431363431663138633734616330636534 Oct 29 04:40:54.228000 audit[2471]: AVC avc: denied { bpf } for pid=2471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:54.228000 audit[2471]: AVC avc: denied { bpf } for pid=2471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:54.228000 audit[2471]: AVC avc: denied { bpf } for pid=2471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:54.228000 audit[2471]: AVC avc: denied { perfmon } for pid=2471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:54.228000 audit[2471]: AVC avc: denied { perfmon } for pid=2471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:54.228000 audit[2471]: AVC avc: denied { perfmon } for pid=2471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:54.228000 audit[2471]: AVC avc: denied { perfmon } for pid=2471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:54.228000 audit[2471]: AVC avc: denied { perfmon } for pid=2471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:54.228000 audit[2471]: AVC avc: denied { bpf } for pid=2471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:54.228000 audit[2471]: AVC avc: denied { bpf } for pid=2471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:54.228000 audit: BPF prog-id=123 op=LOAD Oct 29 04:40:54.228000 audit[2471]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001c59d8 a2=78 a3=c000255600 items=0 ppid=2460 pid=2471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:54.228000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536316636663666366131666431363431663138633734616330636534 Oct 29 04:40:54.229000 audit[2471]: AVC avc: denied { bpf } for pid=2471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:54.229000 audit[2471]: AVC avc: denied { bpf } for pid=2471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:54.229000 audit[2471]: AVC avc: denied { perfmon } for pid=2471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:54.229000 audit[2471]: AVC avc: denied { perfmon } for pid=2471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:54.229000 audit[2471]: AVC avc: denied { perfmon } for pid=2471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:54.229000 audit[2471]: AVC avc: denied { perfmon } for pid=2471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:54.229000 audit[2471]: AVC avc: denied { perfmon } for pid=2471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:54.229000 audit[2471]: AVC avc: denied { bpf } for pid=2471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:54.229000 audit[2471]: AVC avc: denied { bpf } for pid=2471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:54.229000 audit: BPF prog-id=124 op=LOAD Oct 29 04:40:54.229000 audit[2471]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001c5770 a2=78 a3=c000255648 items=0 ppid=2460 pid=2471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:54.229000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536316636663666366131666431363431663138633734616330636534 Oct 29 04:40:54.232000 audit: BPF prog-id=124 op=UNLOAD Oct 29 04:40:54.232000 audit: BPF prog-id=123 op=UNLOAD Oct 29 04:40:54.232000 audit[2471]: AVC avc: denied { bpf } for pid=2471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:54.232000 audit[2471]: AVC avc: denied { bpf } for pid=2471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:54.232000 audit[2471]: AVC avc: denied { bpf } for pid=2471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:54.232000 audit[2471]: AVC avc: denied { perfmon } for pid=2471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:54.232000 audit[2471]: AVC avc: denied { perfmon } for pid=2471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:54.232000 audit[2471]: AVC avc: denied { perfmon } for pid=2471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:54.232000 audit[2471]: AVC avc: denied { perfmon } for pid=2471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:54.232000 audit[2471]: AVC avc: denied { perfmon } for pid=2471 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:54.232000 audit[2471]: AVC avc: denied { bpf } for pid=2471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:54.232000 audit[2471]: AVC avc: denied { bpf } for pid=2471 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:54.232000 audit: BPF prog-id=125 op=LOAD Oct 29 04:40:54.232000 audit[2471]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001c5c30 a2=78 a3=c000255a58 items=0 ppid=2460 pid=2471 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:54.232000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536316636663666366131666431363431663138633734616330636534 Oct 29 04:40:54.269693 env[1204]: time="2025-10-29T04:40:54.269572636Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-2snls,Uid:61e0f36f-8ff5-4eef-830e-21123b4f595a,Namespace:calico-system,Attempt:0,} returns sandbox id \"561f6f6f6a1fd1641f18c74ac0ce4f2879ece3bee43710f2292f56784a3e69fa\"" Oct 29 04:40:54.409000 audit[2528]: NETFILTER_CFG table=filter:101 family=2 entries=22 op=nft_register_rule pid=2528 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 29 04:40:54.409000 audit[2528]: SYSCALL arch=c000003e syscall=46 success=yes exit=8224 a0=3 a1=7ffe06ca0a00 a2=0 a3=7ffe06ca09ec items=0 ppid=2117 pid=2528 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:54.409000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 29 04:40:54.414000 audit[2528]: NETFILTER_CFG table=nat:102 family=2 entries=12 op=nft_register_rule pid=2528 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 29 04:40:54.414000 audit[2528]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffe06ca0a00 a2=0 a3=0 items=0 ppid=2117 pid=2528 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:54.414000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 29 04:40:54.614320 systemd[1]: run-containerd-runc-k8s.io-cb203f3ac7e7dacdb9872a7a2975ee9c70c4e59a8adeec47c8d59a640d4f352c-runc.GnIr33.mount: Deactivated successfully. Oct 29 04:40:55.248668 kubelet[1975]: E1029 04:40:55.248034 1975 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-d8hbp" podUID="78135185-6b36-431d-89d1-d452e0f3a516" Oct 29 04:40:55.629669 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3195535356.mount: Deactivated successfully. Oct 29 04:40:57.252101 kubelet[1975]: E1029 04:40:57.244418 1975 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-d8hbp" podUID="78135185-6b36-431d-89d1-d452e0f3a516" Oct 29 04:40:58.197742 env[1204]: time="2025-10-29T04:40:58.197655442Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 04:40:58.205227 env[1204]: time="2025-10-29T04:40:58.200186839Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:aa1490366a77160b4cc8f9af82281ab7201ffda0882871f860e1eb1c4f825958,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 04:40:58.205227 env[1204]: time="2025-10-29T04:40:58.204030779Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 04:40:58.206845 env[1204]: time="2025-10-29T04:40:58.206793053Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:6f437220b5b3c627fb4a0fc8dc323363101f3c22a8f337612c2a1ddfb73b810c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 04:40:58.207897 env[1204]: time="2025-10-29T04:40:58.207846020Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.30.4\" returns image reference \"sha256:aa1490366a77160b4cc8f9af82281ab7201ffda0882871f860e1eb1c4f825958\"" Oct 29 04:40:58.215647 env[1204]: time="2025-10-29T04:40:58.212365132Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.4\"" Oct 29 04:40:58.240400 env[1204]: time="2025-10-29T04:40:58.240334580Z" level=info msg="CreateContainer within sandbox \"cb203f3ac7e7dacdb9872a7a2975ee9c70c4e59a8adeec47c8d59a640d4f352c\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Oct 29 04:40:58.261488 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1385914367.mount: Deactivated successfully. Oct 29 04:40:58.267881 env[1204]: time="2025-10-29T04:40:58.267797988Z" level=info msg="CreateContainer within sandbox \"cb203f3ac7e7dacdb9872a7a2975ee9c70c4e59a8adeec47c8d59a640d4f352c\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"9670fd2a1b423255dbfeee03bcb8d1ddb781e394aaf93a5413a90ab1fe0e224a\"" Oct 29 04:40:58.271050 env[1204]: time="2025-10-29T04:40:58.271012586Z" level=info msg="StartContainer for \"9670fd2a1b423255dbfeee03bcb8d1ddb781e394aaf93a5413a90ab1fe0e224a\"" Oct 29 04:40:58.311757 systemd[1]: Started cri-containerd-9670fd2a1b423255dbfeee03bcb8d1ddb781e394aaf93a5413a90ab1fe0e224a.scope. Oct 29 04:40:58.372332 kernel: kauditd_printk_skb: 123 callbacks suppressed Oct 29 04:40:58.372807 kernel: audit: type=1400 audit(1761712858.365:988): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:58.365000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:58.365000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:58.382671 kernel: audit: type=1400 audit(1761712858.365:989): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:58.366000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:58.389682 kernel: audit: type=1400 audit(1761712858.366:990): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:58.366000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:58.406641 kernel: audit: type=1400 audit(1761712858.366:991): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:58.406761 kernel: audit: type=1400 audit(1761712858.366:992): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:58.366000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:58.366000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:58.418107 kernel: audit: type=1400 audit(1761712858.366:993): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:58.418214 kernel: audit: type=1400 audit(1761712858.366:994): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:58.366000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:58.423649 kernel: audit: type=1400 audit(1761712858.366:995): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:58.366000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:58.366000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:58.431744 kernel: audit: type=1400 audit(1761712858.366:996): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:58.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:58.371000 audit: BPF prog-id=126 op=LOAD Oct 29 04:40:58.374000 audit[2539]: AVC avc: denied { bpf } for pid=2539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:58.437678 kernel: audit: type=1400 audit(1761712858.371:997): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:58.374000 audit[2539]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000199c48 a2=10 a3=1c items=0 ppid=2387 pid=2539 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:58.374000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936373066643261316234323332353564626665656530336263623864 Oct 29 04:40:58.374000 audit[2539]: AVC avc: denied { perfmon } for pid=2539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:58.374000 audit[2539]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001996b0 a2=3c a3=8 items=0 ppid=2387 pid=2539 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:58.374000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936373066643261316234323332353564626665656530336263623864 Oct 29 04:40:58.374000 audit[2539]: AVC avc: denied { bpf } for pid=2539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:58.374000 audit[2539]: AVC avc: denied { bpf } for pid=2539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:58.374000 audit[2539]: AVC avc: denied { bpf } for pid=2539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:58.374000 audit[2539]: AVC avc: denied { perfmon } for pid=2539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:58.374000 audit[2539]: AVC avc: denied { perfmon } for pid=2539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:58.374000 audit[2539]: AVC avc: denied { perfmon } for pid=2539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:58.374000 audit[2539]: AVC avc: denied { perfmon } for pid=2539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:58.374000 audit[2539]: AVC avc: denied { perfmon } for pid=2539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:58.374000 audit[2539]: AVC avc: denied { bpf } for pid=2539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:58.374000 audit[2539]: AVC avc: denied { bpf } for pid=2539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:58.374000 audit: BPF prog-id=127 op=LOAD Oct 29 04:40:58.374000 audit[2539]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001999d8 a2=78 a3=c000299a20 items=0 ppid=2387 pid=2539 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:58.374000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936373066643261316234323332353564626665656530336263623864 Oct 29 04:40:58.374000 audit[2539]: AVC avc: denied { bpf } for pid=2539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:58.374000 audit[2539]: AVC avc: denied { bpf } for pid=2539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:58.374000 audit[2539]: AVC avc: denied { perfmon } for pid=2539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:58.374000 audit[2539]: AVC avc: denied { perfmon } for pid=2539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:58.374000 audit[2539]: AVC avc: denied { perfmon } for pid=2539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:58.374000 audit[2539]: AVC avc: denied { perfmon } for pid=2539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:58.374000 audit[2539]: AVC avc: denied { perfmon } for pid=2539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:58.374000 audit[2539]: AVC avc: denied { bpf } for pid=2539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:58.374000 audit[2539]: AVC avc: denied { bpf } for pid=2539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:58.374000 audit: BPF prog-id=128 op=LOAD Oct 29 04:40:58.374000 audit[2539]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000199770 a2=78 a3=c000299a68 items=0 ppid=2387 pid=2539 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:58.374000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936373066643261316234323332353564626665656530336263623864 Oct 29 04:40:58.374000 audit: BPF prog-id=128 op=UNLOAD Oct 29 04:40:58.374000 audit: BPF prog-id=127 op=UNLOAD Oct 29 04:40:58.374000 audit[2539]: AVC avc: denied { bpf } for pid=2539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:58.374000 audit[2539]: AVC avc: denied { bpf } for pid=2539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:58.374000 audit[2539]: AVC avc: denied { bpf } for pid=2539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:58.374000 audit[2539]: AVC avc: denied { perfmon } for pid=2539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:58.374000 audit[2539]: AVC avc: denied { perfmon } for pid=2539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:58.374000 audit[2539]: AVC avc: denied { perfmon } for pid=2539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:58.374000 audit[2539]: AVC avc: denied { perfmon } for pid=2539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:58.374000 audit[2539]: AVC avc: denied { perfmon } for pid=2539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:58.374000 audit[2539]: AVC avc: denied { bpf } for pid=2539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:58.374000 audit[2539]: AVC avc: denied { bpf } for pid=2539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:40:58.374000 audit: BPF prog-id=129 op=LOAD Oct 29 04:40:58.374000 audit[2539]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000199c30 a2=78 a3=c000299e78 items=0 ppid=2387 pid=2539 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:40:58.374000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936373066643261316234323332353564626665656530336263623864 Oct 29 04:40:58.466340 env[1204]: time="2025-10-29T04:40:58.466135395Z" level=info msg="StartContainer for \"9670fd2a1b423255dbfeee03bcb8d1ddb781e394aaf93a5413a90ab1fe0e224a\" returns successfully" Oct 29 04:40:59.250830 kubelet[1975]: E1029 04:40:59.250758 1975 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-d8hbp" podUID="78135185-6b36-431d-89d1-d452e0f3a516" Oct 29 04:40:59.455233 kubelet[1975]: I1029 04:40:59.455116 1975 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-6694978bf-km6k2" podStartSLOduration=2.420121731 podStartE2EDuration="6.455056406s" podCreationTimestamp="2025-10-29 04:40:53 +0000 UTC" firstStartedPulling="2025-10-29 04:40:54.175584976 +0000 UTC m=+25.340652901" lastFinishedPulling="2025-10-29 04:40:58.210519644 +0000 UTC m=+29.375587576" observedRunningTime="2025-10-29 04:40:59.452702757 +0000 UTC m=+30.617770699" watchObservedRunningTime="2025-10-29 04:40:59.455056406 +0000 UTC m=+30.620124335" Oct 29 04:40:59.532062 kubelet[1975]: E1029 04:40:59.531918 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 04:40:59.532350 kubelet[1975]: W1029 04:40:59.532316 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 04:40:59.532536 kubelet[1975]: E1029 04:40:59.532502 1975 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 04:40:59.533016 kubelet[1975]: E1029 04:40:59.532994 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 04:40:59.533244 kubelet[1975]: W1029 04:40:59.533154 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 04:40:59.533551 kubelet[1975]: E1029 04:40:59.533488 1975 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 04:40:59.534019 kubelet[1975]: E1029 04:40:59.533999 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 04:40:59.534235 kubelet[1975]: W1029 04:40:59.534210 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 04:40:59.534376 kubelet[1975]: E1029 04:40:59.534352 1975 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 04:40:59.534886 kubelet[1975]: E1029 04:40:59.534864 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 04:40:59.535047 kubelet[1975]: W1029 04:40:59.535023 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 04:40:59.535207 kubelet[1975]: E1029 04:40:59.535168 1975 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 04:40:59.535641 kubelet[1975]: E1029 04:40:59.535588 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 04:40:59.535789 kubelet[1975]: W1029 04:40:59.535765 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 04:40:59.535967 kubelet[1975]: E1029 04:40:59.535940 1975 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 04:40:59.536390 kubelet[1975]: E1029 04:40:59.536358 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 04:40:59.536548 kubelet[1975]: W1029 04:40:59.536514 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 04:40:59.536732 kubelet[1975]: E1029 04:40:59.536708 1975 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 04:40:59.537114 kubelet[1975]: E1029 04:40:59.537093 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 04:40:59.537272 kubelet[1975]: W1029 04:40:59.537247 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 04:40:59.537406 kubelet[1975]: E1029 04:40:59.537382 1975 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 04:40:59.537839 kubelet[1975]: E1029 04:40:59.537818 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 04:40:59.537985 kubelet[1975]: W1029 04:40:59.537960 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 04:40:59.538133 kubelet[1975]: E1029 04:40:59.538109 1975 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 04:40:59.538589 kubelet[1975]: E1029 04:40:59.538568 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 04:40:59.538864 kubelet[1975]: W1029 04:40:59.538838 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 04:40:59.539047 kubelet[1975]: E1029 04:40:59.538974 1975 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 04:40:59.540037 kubelet[1975]: E1029 04:40:59.539976 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 04:40:59.540520 kubelet[1975]: W1029 04:40:59.540494 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 04:40:59.540817 kubelet[1975]: E1029 04:40:59.540752 1975 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 04:40:59.541339 kubelet[1975]: E1029 04:40:59.541319 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 04:40:59.541540 kubelet[1975]: W1029 04:40:59.541464 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 04:40:59.541703 kubelet[1975]: E1029 04:40:59.541677 1975 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 04:40:59.542191 kubelet[1975]: E1029 04:40:59.542171 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 04:40:59.542382 kubelet[1975]: W1029 04:40:59.542311 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 04:40:59.542536 kubelet[1975]: E1029 04:40:59.542513 1975 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 04:40:59.543017 kubelet[1975]: E1029 04:40:59.542997 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 04:40:59.543286 kubelet[1975]: W1029 04:40:59.543260 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 04:40:59.543419 kubelet[1975]: E1029 04:40:59.543395 1975 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 04:40:59.543946 kubelet[1975]: E1029 04:40:59.543854 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 04:40:59.544125 kubelet[1975]: W1029 04:40:59.544103 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 04:40:59.544290 kubelet[1975]: E1029 04:40:59.544266 1975 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 04:40:59.544956 kubelet[1975]: E1029 04:40:59.544934 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 04:40:59.545100 kubelet[1975]: W1029 04:40:59.545076 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 04:40:59.545224 kubelet[1975]: E1029 04:40:59.545200 1975 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 04:40:59.584349 kubelet[1975]: E1029 04:40:59.583990 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 04:40:59.584349 kubelet[1975]: W1029 04:40:59.584022 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 04:40:59.584349 kubelet[1975]: E1029 04:40:59.584047 1975 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 04:40:59.585310 kubelet[1975]: E1029 04:40:59.585287 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 04:40:59.585445 kubelet[1975]: W1029 04:40:59.585420 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 04:40:59.585599 kubelet[1975]: E1029 04:40:59.585565 1975 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 04:40:59.586193 kubelet[1975]: E1029 04:40:59.586170 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 04:40:59.586337 kubelet[1975]: W1029 04:40:59.586311 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 04:40:59.586485 kubelet[1975]: E1029 04:40:59.586458 1975 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 04:40:59.587003 kubelet[1975]: E1029 04:40:59.586976 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 04:40:59.587148 kubelet[1975]: W1029 04:40:59.587123 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 04:40:59.587324 kubelet[1975]: E1029 04:40:59.587300 1975 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 04:40:59.587823 kubelet[1975]: E1029 04:40:59.587776 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 04:40:59.588023 kubelet[1975]: W1029 04:40:59.587982 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 04:40:59.588182 kubelet[1975]: E1029 04:40:59.588157 1975 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 04:40:59.588500 kubelet[1975]: E1029 04:40:59.588479 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 04:40:59.588756 kubelet[1975]: W1029 04:40:59.588731 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 04:40:59.588895 kubelet[1975]: E1029 04:40:59.588871 1975 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 04:40:59.589291 kubelet[1975]: E1029 04:40:59.589269 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 04:40:59.589407 kubelet[1975]: W1029 04:40:59.589383 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 04:40:59.589539 kubelet[1975]: E1029 04:40:59.589515 1975 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 04:40:59.590237 kubelet[1975]: E1029 04:40:59.590215 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 04:40:59.590373 kubelet[1975]: W1029 04:40:59.590349 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 04:40:59.590504 kubelet[1975]: E1029 04:40:59.590480 1975 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 04:40:59.590915 kubelet[1975]: E1029 04:40:59.590893 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 04:40:59.591051 kubelet[1975]: W1029 04:40:59.591026 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 04:40:59.591197 kubelet[1975]: E1029 04:40:59.591173 1975 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 04:40:59.593784 kubelet[1975]: E1029 04:40:59.593747 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 04:40:59.593784 kubelet[1975]: W1029 04:40:59.593781 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 04:40:59.593926 kubelet[1975]: E1029 04:40:59.593799 1975 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 04:40:59.595123 kubelet[1975]: E1029 04:40:59.595093 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 04:40:59.595249 kubelet[1975]: W1029 04:40:59.595224 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 04:40:59.595362 kubelet[1975]: E1029 04:40:59.595338 1975 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 04:40:59.595864 kubelet[1975]: E1029 04:40:59.595840 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 04:40:59.596018 kubelet[1975]: W1029 04:40:59.595993 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 04:40:59.596152 kubelet[1975]: E1029 04:40:59.596127 1975 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 04:40:59.596553 kubelet[1975]: E1029 04:40:59.596522 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 04:40:59.596553 kubelet[1975]: W1029 04:40:59.596547 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 04:40:59.596827 kubelet[1975]: E1029 04:40:59.596797 1975 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 04:40:59.597143 kubelet[1975]: E1029 04:40:59.597116 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 04:40:59.597242 kubelet[1975]: W1029 04:40:59.597227 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 04:40:59.597309 kubelet[1975]: E1029 04:40:59.597250 1975 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 04:40:59.597851 kubelet[1975]: E1029 04:40:59.597823 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 04:40:59.598027 kubelet[1975]: W1029 04:40:59.597998 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 04:40:59.598128 kubelet[1975]: E1029 04:40:59.598034 1975 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 04:40:59.598504 kubelet[1975]: E1029 04:40:59.598470 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 04:40:59.598504 kubelet[1975]: W1029 04:40:59.598494 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 04:40:59.598722 kubelet[1975]: E1029 04:40:59.598512 1975 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 04:40:59.599825 kubelet[1975]: E1029 04:40:59.599796 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 04:40:59.599825 kubelet[1975]: W1029 04:40:59.599818 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 04:40:59.599970 kubelet[1975]: E1029 04:40:59.599836 1975 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 04:40:59.604464 kubelet[1975]: E1029 04:40:59.604438 1975 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Oct 29 04:40:59.604664 kubelet[1975]: W1029 04:40:59.604637 1975 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Oct 29 04:40:59.604853 kubelet[1975]: E1029 04:40:59.604828 1975 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Oct 29 04:41:00.073670 env[1204]: time="2025-10-29T04:41:00.073500612Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 04:41:00.078018 env[1204]: time="2025-10-29T04:41:00.077962648Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:570719e9c34097019014ae2ad94edf4e523bc6892e77fb1c64c23e5b7f390fe5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 04:41:00.084689 env[1204]: time="2025-10-29T04:41:00.084642800Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 04:41:00.088241 env[1204]: time="2025-10-29T04:41:00.088180273Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:50bdfe370b7308fa9957ed1eaccd094aa4f27f9a4f1dfcfef2f8a7696a1551e1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 04:41:00.090442 env[1204]: time="2025-10-29T04:41:00.088810706Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.4\" returns image reference \"sha256:570719e9c34097019014ae2ad94edf4e523bc6892e77fb1c64c23e5b7f390fe5\"" Oct 29 04:41:00.101122 env[1204]: time="2025-10-29T04:41:00.101065318Z" level=info msg="CreateContainer within sandbox \"561f6f6f6a1fd1641f18c74ac0ce4f2879ece3bee43710f2292f56784a3e69fa\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Oct 29 04:41:00.122915 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3213729245.mount: Deactivated successfully. Oct 29 04:41:00.128515 env[1204]: time="2025-10-29T04:41:00.128443278Z" level=info msg="CreateContainer within sandbox \"561f6f6f6a1fd1641f18c74ac0ce4f2879ece3bee43710f2292f56784a3e69fa\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"c65cd8b96c048c290ad33255ef4fe636bd9484c471c63406724b413dc80e9592\"" Oct 29 04:41:00.132248 env[1204]: time="2025-10-29T04:41:00.132201268Z" level=info msg="StartContainer for \"c65cd8b96c048c290ad33255ef4fe636bd9484c471c63406724b413dc80e9592\"" Oct 29 04:41:00.179114 systemd[1]: Started cri-containerd-c65cd8b96c048c290ad33255ef4fe636bd9484c471c63406724b413dc80e9592.scope. Oct 29 04:41:00.220000 audit[2612]: AVC avc: denied { perfmon } for pid=2612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:00.220000 audit[2612]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f00437a8118 items=0 ppid=2460 pid=2612 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:00.220000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336356364386239366330343863323930616433333235356566346665 Oct 29 04:41:00.221000 audit[2612]: AVC avc: denied { bpf } for pid=2612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:00.221000 audit[2612]: AVC avc: denied { bpf } for pid=2612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:00.221000 audit[2612]: AVC avc: denied { bpf } for pid=2612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:00.221000 audit[2612]: AVC avc: denied { perfmon } for pid=2612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:00.221000 audit[2612]: AVC avc: denied { perfmon } for pid=2612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:00.221000 audit[2612]: AVC avc: denied { perfmon } for pid=2612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:00.221000 audit[2612]: AVC avc: denied { perfmon } for pid=2612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:00.221000 audit[2612]: AVC avc: denied { perfmon } for pid=2612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:00.221000 audit[2612]: AVC avc: denied { bpf } for pid=2612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:00.221000 audit[2612]: AVC avc: denied { bpf } for pid=2612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:00.221000 audit: BPF prog-id=130 op=LOAD Oct 29 04:41:00.221000 audit[2612]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c00038bc58 items=0 ppid=2460 pid=2612 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:00.221000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336356364386239366330343863323930616433333235356566346665 Oct 29 04:41:00.222000 audit[2612]: AVC avc: denied { bpf } for pid=2612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:00.222000 audit[2612]: AVC avc: denied { bpf } for pid=2612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:00.222000 audit[2612]: AVC avc: denied { perfmon } for pid=2612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:00.222000 audit[2612]: AVC avc: denied { perfmon } for pid=2612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:00.222000 audit[2612]: AVC avc: denied { perfmon } for pid=2612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:00.222000 audit[2612]: AVC avc: denied { perfmon } for pid=2612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:00.222000 audit[2612]: AVC avc: denied { perfmon } for pid=2612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:00.222000 audit[2612]: AVC avc: denied { bpf } for pid=2612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:00.222000 audit[2612]: AVC avc: denied { bpf } for pid=2612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:00.222000 audit: BPF prog-id=131 op=LOAD Oct 29 04:41:00.222000 audit[2612]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c00038bca8 items=0 ppid=2460 pid=2612 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:00.222000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336356364386239366330343863323930616433333235356566346665 Oct 29 04:41:00.222000 audit: BPF prog-id=131 op=UNLOAD Oct 29 04:41:00.222000 audit: BPF prog-id=130 op=UNLOAD Oct 29 04:41:00.222000 audit[2612]: AVC avc: denied { bpf } for pid=2612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:00.222000 audit[2612]: AVC avc: denied { bpf } for pid=2612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:00.222000 audit[2612]: AVC avc: denied { bpf } for pid=2612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:00.222000 audit[2612]: AVC avc: denied { perfmon } for pid=2612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:00.222000 audit[2612]: AVC avc: denied { perfmon } for pid=2612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:00.222000 audit[2612]: AVC avc: denied { perfmon } for pid=2612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:00.222000 audit[2612]: AVC avc: denied { perfmon } for pid=2612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:00.222000 audit[2612]: AVC avc: denied { perfmon } for pid=2612 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:00.222000 audit[2612]: AVC avc: denied { bpf } for pid=2612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:00.222000 audit[2612]: AVC avc: denied { bpf } for pid=2612 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:00.222000 audit: BPF prog-id=132 op=LOAD Oct 29 04:41:00.222000 audit[2612]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c00038bd38 items=0 ppid=2460 pid=2612 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:00.222000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336356364386239366330343863323930616433333235356566346665 Oct 29 04:41:00.227197 systemd[1]: run-containerd-runc-k8s.io-c65cd8b96c048c290ad33255ef4fe636bd9484c471c63406724b413dc80e9592-runc.t67u9t.mount: Deactivated successfully. Oct 29 04:41:00.271892 env[1204]: time="2025-10-29T04:41:00.271818659Z" level=info msg="StartContainer for \"c65cd8b96c048c290ad33255ef4fe636bd9484c471c63406724b413dc80e9592\" returns successfully" Oct 29 04:41:00.284857 systemd[1]: cri-containerd-c65cd8b96c048c290ad33255ef4fe636bd9484c471c63406724b413dc80e9592.scope: Deactivated successfully. Oct 29 04:41:00.286000 audit: BPF prog-id=132 op=UNLOAD Oct 29 04:41:00.321388 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-c65cd8b96c048c290ad33255ef4fe636bd9484c471c63406724b413dc80e9592-rootfs.mount: Deactivated successfully. Oct 29 04:41:00.471615 kubelet[1975]: I1029 04:41:00.440576 1975 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Oct 29 04:41:00.492374 env[1204]: time="2025-10-29T04:41:00.492240981Z" level=info msg="shim disconnected" id=c65cd8b96c048c290ad33255ef4fe636bd9484c471c63406724b413dc80e9592 Oct 29 04:41:00.492695 env[1204]: time="2025-10-29T04:41:00.492425224Z" level=warning msg="cleaning up after shim disconnected" id=c65cd8b96c048c290ad33255ef4fe636bd9484c471c63406724b413dc80e9592 namespace=k8s.io Oct 29 04:41:00.492695 env[1204]: time="2025-10-29T04:41:00.492489185Z" level=info msg="cleaning up dead shim" Oct 29 04:41:00.520585 env[1204]: time="2025-10-29T04:41:00.520490628Z" level=warning msg="cleanup warnings time=\"2025-10-29T04:41:00Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2656 runtime=io.containerd.runc.v2\n" Oct 29 04:41:01.245532 kubelet[1975]: E1029 04:41:01.245418 1975 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-d8hbp" podUID="78135185-6b36-431d-89d1-d452e0f3a516" Oct 29 04:41:01.451120 env[1204]: time="2025-10-29T04:41:01.450363328Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.4\"" Oct 29 04:41:03.244641 kubelet[1975]: E1029 04:41:03.244537 1975 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-d8hbp" podUID="78135185-6b36-431d-89d1-d452e0f3a516" Oct 29 04:41:05.247247 kubelet[1975]: E1029 04:41:05.247096 1975 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-d8hbp" podUID="78135185-6b36-431d-89d1-d452e0f3a516" Oct 29 04:41:07.247152 kubelet[1975]: E1029 04:41:07.247021 1975 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-d8hbp" podUID="78135185-6b36-431d-89d1-d452e0f3a516" Oct 29 04:41:07.815889 env[1204]: time="2025-10-29T04:41:07.815674232Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 04:41:07.818111 env[1204]: time="2025-10-29T04:41:07.818054893Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:24e1e7377c738d4080eb462a29e2c6756d383d8d25ad87b7f49165581f20c3cd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 04:41:07.820412 env[1204]: time="2025-10-29T04:41:07.820358088Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 04:41:07.822657 env[1204]: time="2025-10-29T04:41:07.822622478Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:273501a9cfbd848ade2b6a8452dfafdd3adb4f9bf9aec45c398a5d19b8026627,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 04:41:07.823853 env[1204]: time="2025-10-29T04:41:07.823800853Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.4\" returns image reference \"sha256:24e1e7377c738d4080eb462a29e2c6756d383d8d25ad87b7f49165581f20c3cd\"" Oct 29 04:41:07.835381 env[1204]: time="2025-10-29T04:41:07.835329537Z" level=info msg="CreateContainer within sandbox \"561f6f6f6a1fd1641f18c74ac0ce4f2879ece3bee43710f2292f56784a3e69fa\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Oct 29 04:41:07.874505 env[1204]: time="2025-10-29T04:41:07.874442972Z" level=info msg="CreateContainer within sandbox \"561f6f6f6a1fd1641f18c74ac0ce4f2879ece3bee43710f2292f56784a3e69fa\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"38dbf5f9495e348d6edc1ed338e71c6e624fa9824c0ba4054a6e169450721614\"" Oct 29 04:41:07.876591 env[1204]: time="2025-10-29T04:41:07.876420999Z" level=info msg="StartContainer for \"38dbf5f9495e348d6edc1ed338e71c6e624fa9824c0ba4054a6e169450721614\"" Oct 29 04:41:07.930083 systemd[1]: Started cri-containerd-38dbf5f9495e348d6edc1ed338e71c6e624fa9824c0ba4054a6e169450721614.scope. Oct 29 04:41:08.023000 audit[2678]: AVC avc: denied { perfmon } for pid=2678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:08.027634 kernel: kauditd_printk_skb: 91 callbacks suppressed Oct 29 04:41:08.027788 kernel: audit: type=1400 audit(1761712868.023:1013): avc: denied { perfmon } for pid=2678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:08.023000 audit[2678]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f89acb6cbd8 items=0 ppid=2460 pid=2678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:08.040623 kernel: audit: type=1300 audit(1761712868.023:1013): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f89acb6cbd8 items=0 ppid=2460 pid=2678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:08.040807 kernel: audit: type=1327 audit(1761712868.023:1013): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338646266356639343935653334386436656463316564333338653731 Oct 29 04:41:08.023000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338646266356639343935653334386436656463316564333338653731 Oct 29 04:41:08.023000 audit[2678]: AVC avc: denied { bpf } for pid=2678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:08.051877 kernel: audit: type=1400 audit(1761712868.023:1014): avc: denied { bpf } for pid=2678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:08.023000 audit[2678]: AVC avc: denied { bpf } for pid=2678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:08.059624 kernel: audit: type=1400 audit(1761712868.023:1014): avc: denied { bpf } for pid=2678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:08.023000 audit[2678]: AVC avc: denied { bpf } for pid=2678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:08.064621 kernel: audit: type=1400 audit(1761712868.023:1014): avc: denied { bpf } for pid=2678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:08.023000 audit[2678]: AVC avc: denied { perfmon } for pid=2678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:08.078652 kernel: audit: type=1400 audit(1761712868.023:1014): avc: denied { perfmon } for pid=2678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:08.023000 audit[2678]: AVC avc: denied { perfmon } for pid=2678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:08.023000 audit[2678]: AVC avc: denied { perfmon } for pid=2678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:08.095799 kernel: audit: type=1400 audit(1761712868.023:1014): avc: denied { perfmon } for pid=2678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:08.095921 kernel: audit: type=1400 audit(1761712868.023:1014): avc: denied { perfmon } for pid=2678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:08.023000 audit[2678]: AVC avc: denied { perfmon } for pid=2678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:08.105638 kernel: audit: type=1400 audit(1761712868.023:1014): avc: denied { perfmon } for pid=2678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:08.023000 audit[2678]: AVC avc: denied { perfmon } for pid=2678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:08.023000 audit[2678]: AVC avc: denied { bpf } for pid=2678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:08.023000 audit[2678]: AVC avc: denied { bpf } for pid=2678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:08.023000 audit: BPF prog-id=133 op=LOAD Oct 29 04:41:08.023000 audit[2678]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0000a0b88 items=0 ppid=2460 pid=2678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:08.023000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338646266356639343935653334386436656463316564333338653731 Oct 29 04:41:08.024000 audit[2678]: AVC avc: denied { bpf } for pid=2678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:08.024000 audit[2678]: AVC avc: denied { bpf } for pid=2678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:08.024000 audit[2678]: AVC avc: denied { perfmon } for pid=2678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:08.024000 audit[2678]: AVC avc: denied { perfmon } for pid=2678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:08.024000 audit[2678]: AVC avc: denied { perfmon } for pid=2678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:08.024000 audit[2678]: AVC avc: denied { perfmon } for pid=2678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:08.024000 audit[2678]: AVC avc: denied { perfmon } for pid=2678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:08.024000 audit[2678]: AVC avc: denied { bpf } for pid=2678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:08.024000 audit[2678]: AVC avc: denied { bpf } for pid=2678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:08.024000 audit: BPF prog-id=134 op=LOAD Oct 29 04:41:08.024000 audit[2678]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0000a0bd8 items=0 ppid=2460 pid=2678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:08.024000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338646266356639343935653334386436656463316564333338653731 Oct 29 04:41:08.024000 audit: BPF prog-id=134 op=UNLOAD Oct 29 04:41:08.024000 audit: BPF prog-id=133 op=UNLOAD Oct 29 04:41:08.024000 audit[2678]: AVC avc: denied { bpf } for pid=2678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:08.024000 audit[2678]: AVC avc: denied { bpf } for pid=2678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:08.024000 audit[2678]: AVC avc: denied { bpf } for pid=2678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:08.024000 audit[2678]: AVC avc: denied { perfmon } for pid=2678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:08.024000 audit[2678]: AVC avc: denied { perfmon } for pid=2678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:08.024000 audit[2678]: AVC avc: denied { perfmon } for pid=2678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:08.024000 audit[2678]: AVC avc: denied { perfmon } for pid=2678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:08.024000 audit[2678]: AVC avc: denied { perfmon } for pid=2678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:08.024000 audit[2678]: AVC avc: denied { bpf } for pid=2678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:08.024000 audit[2678]: AVC avc: denied { bpf } for pid=2678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:08.024000 audit: BPF prog-id=135 op=LOAD Oct 29 04:41:08.024000 audit[2678]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0000a0c68 items=0 ppid=2460 pid=2678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:08.024000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338646266356639343935653334386436656463316564333338653731 Oct 29 04:41:08.115552 env[1204]: time="2025-10-29T04:41:08.115424814Z" level=info msg="StartContainer for \"38dbf5f9495e348d6edc1ed338e71c6e624fa9824c0ba4054a6e169450721614\" returns successfully" Oct 29 04:41:09.244266 kubelet[1975]: E1029 04:41:09.244158 1975 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-d8hbp" podUID="78135185-6b36-431d-89d1-d452e0f3a516" Oct 29 04:41:09.530326 env[1204]: time="2025-10-29T04:41:09.529930534Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Oct 29 04:41:09.535383 systemd[1]: cri-containerd-38dbf5f9495e348d6edc1ed338e71c6e624fa9824c0ba4054a6e169450721614.scope: Deactivated successfully. Oct 29 04:41:09.535898 systemd[1]: cri-containerd-38dbf5f9495e348d6edc1ed338e71c6e624fa9824c0ba4054a6e169450721614.scope: Consumed 1.091s CPU time. Oct 29 04:41:09.539000 audit: BPF prog-id=135 op=UNLOAD Oct 29 04:41:09.584282 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-38dbf5f9495e348d6edc1ed338e71c6e624fa9824c0ba4054a6e169450721614-rootfs.mount: Deactivated successfully. Oct 29 04:41:09.586641 kubelet[1975]: I1029 04:41:09.576649 1975 kubelet_node_status.go:501] "Fast updating node status as it just became ready" Oct 29 04:41:09.589277 env[1204]: time="2025-10-29T04:41:09.589213685Z" level=info msg="shim disconnected" id=38dbf5f9495e348d6edc1ed338e71c6e624fa9824c0ba4054a6e169450721614 Oct 29 04:41:09.589503 env[1204]: time="2025-10-29T04:41:09.589471765Z" level=warning msg="cleaning up after shim disconnected" id=38dbf5f9495e348d6edc1ed338e71c6e624fa9824c0ba4054a6e169450721614 namespace=k8s.io Oct 29 04:41:09.589680 env[1204]: time="2025-10-29T04:41:09.589651823Z" level=info msg="cleaning up dead shim" Oct 29 04:41:09.691245 systemd[1]: Created slice kubepods-burstable-pod34882139_256c_45b8_b83c_22ae2a3a6d10.slice. Oct 29 04:41:09.729301 systemd[1]: Created slice kubepods-burstable-pod68d50d2a_6df7_4b3f_936e_efecabf2c6a8.slice. Oct 29 04:41:09.738383 systemd[1]: Created slice kubepods-besteffort-pod7c4e2a15_2feb_448f_b8ed_a786076858ec.slice. Oct 29 04:41:09.757663 systemd[1]: Created slice kubepods-besteffort-pod57e20c90_b794_43c0_9bb8_52537b32f5f1.slice. Oct 29 04:41:09.774331 systemd[1]: Created slice kubepods-besteffort-pod9af229d2_d1e1_477e_9280_265e378cba4b.slice. Oct 29 04:41:09.775699 kubelet[1975]: I1029 04:41:09.775664 1975 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config\" (UniqueName: \"kubernetes.io/configmap/4809fb25-1663-4bc2-b12f-599470e2bb91-config\") pod \"goldmane-666569f655-w7zrh\" (UID: \"4809fb25-1663-4bc2-b12f-599470e2bb91\") " pod="calico-system/goldmane-666569f655-w7zrh" Oct 29 04:41:09.777775 kubelet[1975]: I1029 04:41:09.777710 1975 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/57e20c90-b794-43c0-9bb8-52537b32f5f1-whisker-backend-key-pair\") pod \"whisker-5bfb84f6-jwthd\" (UID: \"57e20c90-b794-43c0-9bb8-52537b32f5f1\") " pod="calico-system/whisker-5bfb84f6-jwthd" Oct 29 04:41:09.777894 kubelet[1975]: I1029 04:41:09.777813 1975 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/68d50d2a-6df7-4b3f-936e-efecabf2c6a8-config-volume\") pod \"coredns-668d6bf9bc-5zwgd\" (UID: \"68d50d2a-6df7-4b3f-936e-efecabf2c6a8\") " pod="kube-system/coredns-668d6bf9bc-5zwgd" Oct 29 04:41:09.777894 kubelet[1975]: I1029 04:41:09.777874 1975 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-k9r7m\" (UniqueName: \"kubernetes.io/projected/34882139-256c-45b8-b83c-22ae2a3a6d10-kube-api-access-k9r7m\") pod \"coredns-668d6bf9bc-gdp2b\" (UID: \"34882139-256c-45b8-b83c-22ae2a3a6d10\") " pod="kube-system/coredns-668d6bf9bc-gdp2b" Oct 29 04:41:09.778023 kubelet[1975]: I1029 04:41:09.777921 1975 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/57e20c90-b794-43c0-9bb8-52537b32f5f1-whisker-ca-bundle\") pod \"whisker-5bfb84f6-jwthd\" (UID: \"57e20c90-b794-43c0-9bb8-52537b32f5f1\") " pod="calico-system/whisker-5bfb84f6-jwthd" Oct 29 04:41:09.778023 kubelet[1975]: I1029 04:41:09.777990 1975 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-9l8qf\" (UniqueName: \"kubernetes.io/projected/68d50d2a-6df7-4b3f-936e-efecabf2c6a8-kube-api-access-9l8qf\") pod \"coredns-668d6bf9bc-5zwgd\" (UID: \"68d50d2a-6df7-4b3f-936e-efecabf2c6a8\") " pod="kube-system/coredns-668d6bf9bc-5zwgd" Oct 29 04:41:09.778162 kubelet[1975]: I1029 04:41:09.778049 1975 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-kp7fs\" (UniqueName: \"kubernetes.io/projected/7c4e2a15-2feb-448f-b8ed-a786076858ec-kube-api-access-kp7fs\") pod \"calico-kube-controllers-76dd6544c7-psclk\" (UID: \"7c4e2a15-2feb-448f-b8ed-a786076858ec\") " pod="calico-system/calico-kube-controllers-76dd6544c7-psclk" Oct 29 04:41:09.778162 kubelet[1975]: I1029 04:41:09.778122 1975 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/34882139-256c-45b8-b83c-22ae2a3a6d10-config-volume\") pod \"coredns-668d6bf9bc-gdp2b\" (UID: \"34882139-256c-45b8-b83c-22ae2a3a6d10\") " pod="kube-system/coredns-668d6bf9bc-gdp2b" Oct 29 04:41:09.778997 kubelet[1975]: I1029 04:41:09.778177 1975 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"goldmane-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/4809fb25-1663-4bc2-b12f-599470e2bb91-goldmane-ca-bundle\") pod \"goldmane-666569f655-w7zrh\" (UID: \"4809fb25-1663-4bc2-b12f-599470e2bb91\") " pod="calico-system/goldmane-666569f655-w7zrh" Oct 29 04:41:09.779098 kubelet[1975]: I1029 04:41:09.779021 1975 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"goldmane-key-pair\" (UniqueName: \"kubernetes.io/secret/4809fb25-1663-4bc2-b12f-599470e2bb91-goldmane-key-pair\") pod \"goldmane-666569f655-w7zrh\" (UID: \"4809fb25-1663-4bc2-b12f-599470e2bb91\") " pod="calico-system/goldmane-666569f655-w7zrh" Oct 29 04:41:09.779157 kubelet[1975]: I1029 04:41:09.779096 1975 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-vfjnd\" (UniqueName: \"kubernetes.io/projected/c55cf193-f032-43fb-94cc-3208d0f6de96-kube-api-access-vfjnd\") pod \"calico-apiserver-66b476d74-9x56r\" (UID: \"c55cf193-f032-43fb-94cc-3208d0f6de96\") " pod="calico-apiserver/calico-apiserver-66b476d74-9x56r" Oct 29 04:41:09.779245 kubelet[1975]: I1029 04:41:09.779174 1975 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/7c4e2a15-2feb-448f-b8ed-a786076858ec-tigera-ca-bundle\") pod \"calico-kube-controllers-76dd6544c7-psclk\" (UID: \"7c4e2a15-2feb-448f-b8ed-a786076858ec\") " pod="calico-system/calico-kube-controllers-76dd6544c7-psclk" Oct 29 04:41:09.779327 kubelet[1975]: I1029 04:41:09.779262 1975 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-zbz8q\" (UniqueName: \"kubernetes.io/projected/4809fb25-1663-4bc2-b12f-599470e2bb91-kube-api-access-zbz8q\") pod \"goldmane-666569f655-w7zrh\" (UID: \"4809fb25-1663-4bc2-b12f-599470e2bb91\") " pod="calico-system/goldmane-666569f655-w7zrh" Oct 29 04:41:09.779398 kubelet[1975]: I1029 04:41:09.779328 1975 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-6jl24\" (UniqueName: \"kubernetes.io/projected/57e20c90-b794-43c0-9bb8-52537b32f5f1-kube-api-access-6jl24\") pod \"whisker-5bfb84f6-jwthd\" (UID: \"57e20c90-b794-43c0-9bb8-52537b32f5f1\") " pod="calico-system/whisker-5bfb84f6-jwthd" Oct 29 04:41:09.779459 kubelet[1975]: I1029 04:41:09.779403 1975 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/c55cf193-f032-43fb-94cc-3208d0f6de96-calico-apiserver-certs\") pod \"calico-apiserver-66b476d74-9x56r\" (UID: \"c55cf193-f032-43fb-94cc-3208d0f6de96\") " pod="calico-apiserver/calico-apiserver-66b476d74-9x56r" Oct 29 04:41:09.779528 kubelet[1975]: I1029 04:41:09.779460 1975 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/9af229d2-d1e1-477e-9280-265e378cba4b-calico-apiserver-certs\") pod \"calico-apiserver-66b476d74-xnzfh\" (UID: \"9af229d2-d1e1-477e-9280-265e378cba4b\") " pod="calico-apiserver/calico-apiserver-66b476d74-xnzfh" Oct 29 04:41:09.779615 kubelet[1975]: I1029 04:41:09.779550 1975 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-2j29h\" (UniqueName: \"kubernetes.io/projected/9af229d2-d1e1-477e-9280-265e378cba4b-kube-api-access-2j29h\") pod \"calico-apiserver-66b476d74-xnzfh\" (UID: \"9af229d2-d1e1-477e-9280-265e378cba4b\") " pod="calico-apiserver/calico-apiserver-66b476d74-xnzfh" Oct 29 04:41:09.792293 systemd[1]: Created slice kubepods-besteffort-pod4809fb25_1663_4bc2_b12f_599470e2bb91.slice. Oct 29 04:41:09.819746 systemd[1]: Created slice kubepods-besteffort-podc55cf193_f032_43fb_94cc_3208d0f6de96.slice. Oct 29 04:41:10.012498 env[1204]: time="2025-10-29T04:41:10.012386222Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-gdp2b,Uid:34882139-256c-45b8-b83c-22ae2a3a6d10,Namespace:kube-system,Attempt:0,}" Oct 29 04:41:10.055687 env[1204]: time="2025-10-29T04:41:10.049222283Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-5zwgd,Uid:68d50d2a-6df7-4b3f-936e-efecabf2c6a8,Namespace:kube-system,Attempt:0,}" Oct 29 04:41:10.066971 env[1204]: time="2025-10-29T04:41:10.066905979Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-76dd6544c7-psclk,Uid:7c4e2a15-2feb-448f-b8ed-a786076858ec,Namespace:calico-system,Attempt:0,}" Oct 29 04:41:10.070574 env[1204]: time="2025-10-29T04:41:10.070528219Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-5bfb84f6-jwthd,Uid:57e20c90-b794-43c0-9bb8-52537b32f5f1,Namespace:calico-system,Attempt:0,}" Oct 29 04:41:10.088707 env[1204]: time="2025-10-29T04:41:10.088641542Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-66b476d74-xnzfh,Uid:9af229d2-d1e1-477e-9280-265e378cba4b,Namespace:calico-apiserver,Attempt:0,}" Oct 29 04:41:10.130383 env[1204]: time="2025-10-29T04:41:10.129592028Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-666569f655-w7zrh,Uid:4809fb25-1663-4bc2-b12f-599470e2bb91,Namespace:calico-system,Attempt:0,}" Oct 29 04:41:10.132001 env[1204]: time="2025-10-29T04:41:10.131954657Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-66b476d74-9x56r,Uid:c55cf193-f032-43fb-94cc-3208d0f6de96,Namespace:calico-apiserver,Attempt:0,}" Oct 29 04:41:10.527060 env[1204]: time="2025-10-29T04:41:10.526900842Z" level=error msg="Failed to destroy network for sandbox \"ad374dbade8f660d240b0bb0f068c77b921938093f528426596eab6f65d685eb\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 29 04:41:10.528337 env[1204]: time="2025-10-29T04:41:10.528271843Z" level=error msg="encountered an error cleaning up failed sandbox \"ad374dbade8f660d240b0bb0f068c77b921938093f528426596eab6f65d685eb\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 29 04:41:10.528618 env[1204]: time="2025-10-29T04:41:10.528558244Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-76dd6544c7-psclk,Uid:7c4e2a15-2feb-448f-b8ed-a786076858ec,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"ad374dbade8f660d240b0bb0f068c77b921938093f528426596eab6f65d685eb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 29 04:41:10.541052 env[1204]: time="2025-10-29T04:41:10.540955769Z" level=error msg="Failed to destroy network for sandbox \"88d9253440278e9e8c1a4e68f7af94c4f9992df0826ca49cf0f4efe7518bc226\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 29 04:41:10.544469 env[1204]: time="2025-10-29T04:41:10.544409180Z" level=error msg="encountered an error cleaning up failed sandbox \"88d9253440278e9e8c1a4e68f7af94c4f9992df0826ca49cf0f4efe7518bc226\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 29 04:41:10.544796 env[1204]: time="2025-10-29T04:41:10.544738895Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-gdp2b,Uid:34882139-256c-45b8-b83c-22ae2a3a6d10,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"88d9253440278e9e8c1a4e68f7af94c4f9992df0826ca49cf0f4efe7518bc226\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 29 04:41:10.545958 kubelet[1975]: E1029 04:41:10.545713 1975 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"88d9253440278e9e8c1a4e68f7af94c4f9992df0826ca49cf0f4efe7518bc226\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 29 04:41:10.545958 kubelet[1975]: E1029 04:41:10.545737 1975 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ad374dbade8f660d240b0bb0f068c77b921938093f528426596eab6f65d685eb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 29 04:41:10.548644 kubelet[1975]: E1029 04:41:10.548085 1975 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"88d9253440278e9e8c1a4e68f7af94c4f9992df0826ca49cf0f4efe7518bc226\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-668d6bf9bc-gdp2b" Oct 29 04:41:10.548644 kubelet[1975]: E1029 04:41:10.548155 1975 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"88d9253440278e9e8c1a4e68f7af94c4f9992df0826ca49cf0f4efe7518bc226\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-668d6bf9bc-gdp2b" Oct 29 04:41:10.548644 kubelet[1975]: E1029 04:41:10.548327 1975 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-668d6bf9bc-gdp2b_kube-system(34882139-256c-45b8-b83c-22ae2a3a6d10)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-668d6bf9bc-gdp2b_kube-system(34882139-256c-45b8-b83c-22ae2a3a6d10)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"88d9253440278e9e8c1a4e68f7af94c4f9992df0826ca49cf0f4efe7518bc226\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-668d6bf9bc-gdp2b" podUID="34882139-256c-45b8-b83c-22ae2a3a6d10" Oct 29 04:41:10.550414 kubelet[1975]: E1029 04:41:10.548086 1975 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ad374dbade8f660d240b0bb0f068c77b921938093f528426596eab6f65d685eb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-76dd6544c7-psclk" Oct 29 04:41:10.550414 kubelet[1975]: E1029 04:41:10.549836 1975 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ad374dbade8f660d240b0bb0f068c77b921938093f528426596eab6f65d685eb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-76dd6544c7-psclk" Oct 29 04:41:10.550414 kubelet[1975]: E1029 04:41:10.549899 1975 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-76dd6544c7-psclk_calico-system(7c4e2a15-2feb-448f-b8ed-a786076858ec)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-76dd6544c7-psclk_calico-system(7c4e2a15-2feb-448f-b8ed-a786076858ec)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"ad374dbade8f660d240b0bb0f068c77b921938093f528426596eab6f65d685eb\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-76dd6544c7-psclk" podUID="7c4e2a15-2feb-448f-b8ed-a786076858ec" Oct 29 04:41:10.559046 env[1204]: time="2025-10-29T04:41:10.558986529Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.4\"" Oct 29 04:41:10.622359 kubelet[1975]: I1029 04:41:10.622296 1975 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="ad374dbade8f660d240b0bb0f068c77b921938093f528426596eab6f65d685eb" Oct 29 04:41:10.637744 env[1204]: time="2025-10-29T04:41:10.637568365Z" level=error msg="Failed to destroy network for sandbox \"0a766542938c9a629ef7c3f9b499f1b8c875a6f90bffcd4c7cfd1b1f50f55132\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 29 04:41:10.641327 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-0a766542938c9a629ef7c3f9b499f1b8c875a6f90bffcd4c7cfd1b1f50f55132-shm.mount: Deactivated successfully. Oct 29 04:41:10.644564 env[1204]: time="2025-10-29T04:41:10.643430677Z" level=error msg="encountered an error cleaning up failed sandbox \"0a766542938c9a629ef7c3f9b499f1b8c875a6f90bffcd4c7cfd1b1f50f55132\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 29 04:41:10.647805 env[1204]: time="2025-10-29T04:41:10.647737567Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-5bfb84f6-jwthd,Uid:57e20c90-b794-43c0-9bb8-52537b32f5f1,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"0a766542938c9a629ef7c3f9b499f1b8c875a6f90bffcd4c7cfd1b1f50f55132\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 29 04:41:10.648268 kubelet[1975]: E1029 04:41:10.648209 1975 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0a766542938c9a629ef7c3f9b499f1b8c875a6f90bffcd4c7cfd1b1f50f55132\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 29 04:41:10.648386 kubelet[1975]: E1029 04:41:10.648326 1975 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0a766542938c9a629ef7c3f9b499f1b8c875a6f90bffcd4c7cfd1b1f50f55132\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/whisker-5bfb84f6-jwthd" Oct 29 04:41:10.649513 kubelet[1975]: E1029 04:41:10.648380 1975 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0a766542938c9a629ef7c3f9b499f1b8c875a6f90bffcd4c7cfd1b1f50f55132\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/whisker-5bfb84f6-jwthd" Oct 29 04:41:10.649513 kubelet[1975]: E1029 04:41:10.648560 1975 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"whisker-5bfb84f6-jwthd_calico-system(57e20c90-b794-43c0-9bb8-52537b32f5f1)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"whisker-5bfb84f6-jwthd_calico-system(57e20c90-b794-43c0-9bb8-52537b32f5f1)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"0a766542938c9a629ef7c3f9b499f1b8c875a6f90bffcd4c7cfd1b1f50f55132\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/whisker-5bfb84f6-jwthd" podUID="57e20c90-b794-43c0-9bb8-52537b32f5f1" Oct 29 04:41:10.668146 env[1204]: time="2025-10-29T04:41:10.668030797Z" level=error msg="Failed to destroy network for sandbox \"3a6531b7a71ead9ba41921822995cf180b9099b3f798fb351c5a7b17032b2dc8\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 29 04:41:10.671671 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-3a6531b7a71ead9ba41921822995cf180b9099b3f798fb351c5a7b17032b2dc8-shm.mount: Deactivated successfully. Oct 29 04:41:10.673007 env[1204]: time="2025-10-29T04:41:10.672942147Z" level=error msg="encountered an error cleaning up failed sandbox \"3a6531b7a71ead9ba41921822995cf180b9099b3f798fb351c5a7b17032b2dc8\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 29 04:41:10.673343 env[1204]: time="2025-10-29T04:41:10.673287943Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-5zwgd,Uid:68d50d2a-6df7-4b3f-936e-efecabf2c6a8,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"3a6531b7a71ead9ba41921822995cf180b9099b3f798fb351c5a7b17032b2dc8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 29 04:41:10.674208 kubelet[1975]: E1029 04:41:10.673910 1975 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3a6531b7a71ead9ba41921822995cf180b9099b3f798fb351c5a7b17032b2dc8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 29 04:41:10.674208 kubelet[1975]: E1029 04:41:10.674003 1975 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3a6531b7a71ead9ba41921822995cf180b9099b3f798fb351c5a7b17032b2dc8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-668d6bf9bc-5zwgd" Oct 29 04:41:10.674208 kubelet[1975]: E1029 04:41:10.674047 1975 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3a6531b7a71ead9ba41921822995cf180b9099b3f798fb351c5a7b17032b2dc8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-668d6bf9bc-5zwgd" Oct 29 04:41:10.674823 kubelet[1975]: E1029 04:41:10.674738 1975 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-668d6bf9bc-5zwgd_kube-system(68d50d2a-6df7-4b3f-936e-efecabf2c6a8)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-668d6bf9bc-5zwgd_kube-system(68d50d2a-6df7-4b3f-936e-efecabf2c6a8)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"3a6531b7a71ead9ba41921822995cf180b9099b3f798fb351c5a7b17032b2dc8\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-668d6bf9bc-5zwgd" podUID="68d50d2a-6df7-4b3f-936e-efecabf2c6a8" Oct 29 04:41:10.699659 env[1204]: time="2025-10-29T04:41:10.699534355Z" level=error msg="Failed to destroy network for sandbox \"7323a19d860bb5d74cbd57031ef5356f707ee0b8a4838c99c2c88581a95a96ea\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 29 04:41:10.703301 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-7323a19d860bb5d74cbd57031ef5356f707ee0b8a4838c99c2c88581a95a96ea-shm.mount: Deactivated successfully. Oct 29 04:41:10.704280 env[1204]: time="2025-10-29T04:41:10.704202704Z" level=error msg="encountered an error cleaning up failed sandbox \"7323a19d860bb5d74cbd57031ef5356f707ee0b8a4838c99c2c88581a95a96ea\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 29 04:41:10.704526 env[1204]: time="2025-10-29T04:41:10.704470089Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-666569f655-w7zrh,Uid:4809fb25-1663-4bc2-b12f-599470e2bb91,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"7323a19d860bb5d74cbd57031ef5356f707ee0b8a4838c99c2c88581a95a96ea\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 29 04:41:10.705661 kubelet[1975]: E1029 04:41:10.705566 1975 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7323a19d860bb5d74cbd57031ef5356f707ee0b8a4838c99c2c88581a95a96ea\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 29 04:41:10.705792 kubelet[1975]: E1029 04:41:10.705715 1975 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7323a19d860bb5d74cbd57031ef5356f707ee0b8a4838c99c2c88581a95a96ea\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/goldmane-666569f655-w7zrh" Oct 29 04:41:10.705792 kubelet[1975]: E1029 04:41:10.705759 1975 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7323a19d860bb5d74cbd57031ef5356f707ee0b8a4838c99c2c88581a95a96ea\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/goldmane-666569f655-w7zrh" Oct 29 04:41:10.705999 kubelet[1975]: E1029 04:41:10.705903 1975 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"goldmane-666569f655-w7zrh_calico-system(4809fb25-1663-4bc2-b12f-599470e2bb91)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"goldmane-666569f655-w7zrh_calico-system(4809fb25-1663-4bc2-b12f-599470e2bb91)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"7323a19d860bb5d74cbd57031ef5356f707ee0b8a4838c99c2c88581a95a96ea\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/goldmane-666569f655-w7zrh" podUID="4809fb25-1663-4bc2-b12f-599470e2bb91" Oct 29 04:41:10.717062 env[1204]: time="2025-10-29T04:41:10.716995843Z" level=error msg="Failed to destroy network for sandbox \"818044961d5e8b93ed26f933b4aeb46a7e4f17d66029e564ee97f0fbc4f7b009\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 29 04:41:10.720177 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-818044961d5e8b93ed26f933b4aeb46a7e4f17d66029e564ee97f0fbc4f7b009-shm.mount: Deactivated successfully. Oct 29 04:41:10.723466 env[1204]: time="2025-10-29T04:41:10.723380318Z" level=error msg="encountered an error cleaning up failed sandbox \"818044961d5e8b93ed26f933b4aeb46a7e4f17d66029e564ee97f0fbc4f7b009\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 29 04:41:10.723675 env[1204]: time="2025-10-29T04:41:10.723576779Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-66b476d74-xnzfh,Uid:9af229d2-d1e1-477e-9280-265e378cba4b,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"818044961d5e8b93ed26f933b4aeb46a7e4f17d66029e564ee97f0fbc4f7b009\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 29 04:41:10.724260 kubelet[1975]: E1029 04:41:10.724160 1975 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"818044961d5e8b93ed26f933b4aeb46a7e4f17d66029e564ee97f0fbc4f7b009\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 29 04:41:10.724376 kubelet[1975]: E1029 04:41:10.724293 1975 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"818044961d5e8b93ed26f933b4aeb46a7e4f17d66029e564ee97f0fbc4f7b009\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-66b476d74-xnzfh" Oct 29 04:41:10.724457 kubelet[1975]: E1029 04:41:10.724329 1975 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"818044961d5e8b93ed26f933b4aeb46a7e4f17d66029e564ee97f0fbc4f7b009\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-66b476d74-xnzfh" Oct 29 04:41:10.724617 kubelet[1975]: E1029 04:41:10.724544 1975 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-66b476d74-xnzfh_calico-apiserver(9af229d2-d1e1-477e-9280-265e378cba4b)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-66b476d74-xnzfh_calico-apiserver(9af229d2-d1e1-477e-9280-265e378cba4b)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"818044961d5e8b93ed26f933b4aeb46a7e4f17d66029e564ee97f0fbc4f7b009\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-66b476d74-xnzfh" podUID="9af229d2-d1e1-477e-9280-265e378cba4b" Oct 29 04:41:10.739381 env[1204]: time="2025-10-29T04:41:10.739307676Z" level=error msg="Failed to destroy network for sandbox \"e60a5ca3dace57260718564cf1200a77eea8f638b71cc553b50495e72983c2f5\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 29 04:41:10.740226 env[1204]: time="2025-10-29T04:41:10.740181133Z" level=error msg="encountered an error cleaning up failed sandbox \"e60a5ca3dace57260718564cf1200a77eea8f638b71cc553b50495e72983c2f5\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 29 04:41:10.740496 env[1204]: time="2025-10-29T04:41:10.740414668Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-66b476d74-9x56r,Uid:c55cf193-f032-43fb-94cc-3208d0f6de96,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"e60a5ca3dace57260718564cf1200a77eea8f638b71cc553b50495e72983c2f5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 29 04:41:10.741595 kubelet[1975]: E1029 04:41:10.740924 1975 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e60a5ca3dace57260718564cf1200a77eea8f638b71cc553b50495e72983c2f5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 29 04:41:10.741595 kubelet[1975]: E1029 04:41:10.741010 1975 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e60a5ca3dace57260718564cf1200a77eea8f638b71cc553b50495e72983c2f5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-66b476d74-9x56r" Oct 29 04:41:10.741595 kubelet[1975]: E1029 04:41:10.741041 1975 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e60a5ca3dace57260718564cf1200a77eea8f638b71cc553b50495e72983c2f5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-66b476d74-9x56r" Oct 29 04:41:10.741994 kubelet[1975]: E1029 04:41:10.741166 1975 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-66b476d74-9x56r_calico-apiserver(c55cf193-f032-43fb-94cc-3208d0f6de96)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-66b476d74-9x56r_calico-apiserver(c55cf193-f032-43fb-94cc-3208d0f6de96)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"e60a5ca3dace57260718564cf1200a77eea8f638b71cc553b50495e72983c2f5\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-66b476d74-9x56r" podUID="c55cf193-f032-43fb-94cc-3208d0f6de96" Oct 29 04:41:11.255110 systemd[1]: Created slice kubepods-besteffort-pod78135185_6b36_431d_89d1_d452e0f3a516.slice. Oct 29 04:41:11.260012 env[1204]: time="2025-10-29T04:41:11.259960597Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-d8hbp,Uid:78135185-6b36-431d-89d1-d452e0f3a516,Namespace:calico-system,Attempt:0,}" Oct 29 04:41:11.345413 env[1204]: time="2025-10-29T04:41:11.345326765Z" level=error msg="Failed to destroy network for sandbox \"9041a05e02e36ff51f1c8c799085046320ea35c39cca48c649c91630527e9528\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 29 04:41:11.346102 env[1204]: time="2025-10-29T04:41:11.346057219Z" level=error msg="encountered an error cleaning up failed sandbox \"9041a05e02e36ff51f1c8c799085046320ea35c39cca48c649c91630527e9528\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 29 04:41:11.347013 env[1204]: time="2025-10-29T04:41:11.346140444Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-d8hbp,Uid:78135185-6b36-431d-89d1-d452e0f3a516,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"9041a05e02e36ff51f1c8c799085046320ea35c39cca48c649c91630527e9528\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 29 04:41:11.347116 kubelet[1975]: E1029 04:41:11.346512 1975 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9041a05e02e36ff51f1c8c799085046320ea35c39cca48c649c91630527e9528\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 29 04:41:11.347116 kubelet[1975]: E1029 04:41:11.346744 1975 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9041a05e02e36ff51f1c8c799085046320ea35c39cca48c649c91630527e9528\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-d8hbp" Oct 29 04:41:11.347116 kubelet[1975]: E1029 04:41:11.346790 1975 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9041a05e02e36ff51f1c8c799085046320ea35c39cca48c649c91630527e9528\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-d8hbp" Oct 29 04:41:11.347692 kubelet[1975]: E1029 04:41:11.346874 1975 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-d8hbp_calico-system(78135185-6b36-431d-89d1-d452e0f3a516)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-d8hbp_calico-system(78135185-6b36-431d-89d1-d452e0f3a516)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"9041a05e02e36ff51f1c8c799085046320ea35c39cca48c649c91630527e9528\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-d8hbp" podUID="78135185-6b36-431d-89d1-d452e0f3a516" Oct 29 04:41:11.584111 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-e60a5ca3dace57260718564cf1200a77eea8f638b71cc553b50495e72983c2f5-shm.mount: Deactivated successfully. Oct 29 04:41:11.624794 kubelet[1975]: I1029 04:41:11.624727 1975 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="818044961d5e8b93ed26f933b4aeb46a7e4f17d66029e564ee97f0fbc4f7b009" Oct 29 04:41:11.629451 env[1204]: time="2025-10-29T04:41:11.628202175Z" level=info msg="StopPodSandbox for \"818044961d5e8b93ed26f933b4aeb46a7e4f17d66029e564ee97f0fbc4f7b009\"" Oct 29 04:41:11.631076 kubelet[1975]: I1029 04:41:11.631035 1975 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="3a6531b7a71ead9ba41921822995cf180b9099b3f798fb351c5a7b17032b2dc8" Oct 29 04:41:11.632427 env[1204]: time="2025-10-29T04:41:11.632390213Z" level=info msg="StopPodSandbox for \"3a6531b7a71ead9ba41921822995cf180b9099b3f798fb351c5a7b17032b2dc8\"" Oct 29 04:41:11.637239 kubelet[1975]: I1029 04:41:11.637078 1975 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="9041a05e02e36ff51f1c8c799085046320ea35c39cca48c649c91630527e9528" Oct 29 04:41:11.640135 env[1204]: time="2025-10-29T04:41:11.640078055Z" level=info msg="StopPodSandbox for \"9041a05e02e36ff51f1c8c799085046320ea35c39cca48c649c91630527e9528\"" Oct 29 04:41:11.641690 kubelet[1975]: I1029 04:41:11.641287 1975 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="0a766542938c9a629ef7c3f9b499f1b8c875a6f90bffcd4c7cfd1b1f50f55132" Oct 29 04:41:11.642234 env[1204]: time="2025-10-29T04:41:11.642197464Z" level=info msg="StopPodSandbox for \"0a766542938c9a629ef7c3f9b499f1b8c875a6f90bffcd4c7cfd1b1f50f55132\"" Oct 29 04:41:11.648220 kubelet[1975]: I1029 04:41:11.647578 1975 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="e60a5ca3dace57260718564cf1200a77eea8f638b71cc553b50495e72983c2f5" Oct 29 04:41:11.650270 env[1204]: time="2025-10-29T04:41:11.650225878Z" level=info msg="StopPodSandbox for \"e60a5ca3dace57260718564cf1200a77eea8f638b71cc553b50495e72983c2f5\"" Oct 29 04:41:11.653017 kubelet[1975]: I1029 04:41:11.652238 1975 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="88d9253440278e9e8c1a4e68f7af94c4f9992df0826ca49cf0f4efe7518bc226" Oct 29 04:41:11.655731 env[1204]: time="2025-10-29T04:41:11.655684493Z" level=info msg="StopPodSandbox for \"88d9253440278e9e8c1a4e68f7af94c4f9992df0826ca49cf0f4efe7518bc226\"" Oct 29 04:41:11.658789 kubelet[1975]: I1029 04:41:11.658762 1975 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="7323a19d860bb5d74cbd57031ef5356f707ee0b8a4838c99c2c88581a95a96ea" Oct 29 04:41:11.661876 env[1204]: time="2025-10-29T04:41:11.660499786Z" level=info msg="StopPodSandbox for \"7323a19d860bb5d74cbd57031ef5356f707ee0b8a4838c99c2c88581a95a96ea\"" Oct 29 04:41:11.662508 env[1204]: time="2025-10-29T04:41:11.662473730Z" level=info msg="StopPodSandbox for \"ad374dbade8f660d240b0bb0f068c77b921938093f528426596eab6f65d685eb\"" Oct 29 04:41:11.732842 kubelet[1975]: I1029 04:41:11.732790 1975 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Oct 29 04:41:11.740773 env[1204]: time="2025-10-29T04:41:11.740697567Z" level=error msg="StopPodSandbox for \"818044961d5e8b93ed26f933b4aeb46a7e4f17d66029e564ee97f0fbc4f7b009\" failed" error="failed to destroy network for sandbox \"818044961d5e8b93ed26f933b4aeb46a7e4f17d66029e564ee97f0fbc4f7b009\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 29 04:41:11.741695 kubelet[1975]: E1029 04:41:11.741559 1975 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"818044961d5e8b93ed26f933b4aeb46a7e4f17d66029e564ee97f0fbc4f7b009\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="818044961d5e8b93ed26f933b4aeb46a7e4f17d66029e564ee97f0fbc4f7b009" Oct 29 04:41:11.741867 kubelet[1975]: E1029 04:41:11.741747 1975 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"818044961d5e8b93ed26f933b4aeb46a7e4f17d66029e564ee97f0fbc4f7b009"} Oct 29 04:41:11.741982 kubelet[1975]: E1029 04:41:11.741909 1975 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"9af229d2-d1e1-477e-9280-265e378cba4b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"818044961d5e8b93ed26f933b4aeb46a7e4f17d66029e564ee97f0fbc4f7b009\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 29 04:41:11.742110 kubelet[1975]: E1029 04:41:11.741990 1975 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"9af229d2-d1e1-477e-9280-265e378cba4b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"818044961d5e8b93ed26f933b4aeb46a7e4f17d66029e564ee97f0fbc4f7b009\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-66b476d74-xnzfh" podUID="9af229d2-d1e1-477e-9280-265e378cba4b" Oct 29 04:41:11.828871 env[1204]: time="2025-10-29T04:41:11.828782050Z" level=error msg="StopPodSandbox for \"3a6531b7a71ead9ba41921822995cf180b9099b3f798fb351c5a7b17032b2dc8\" failed" error="failed to destroy network for sandbox \"3a6531b7a71ead9ba41921822995cf180b9099b3f798fb351c5a7b17032b2dc8\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 29 04:41:11.831901 kubelet[1975]: E1029 04:41:11.831636 1975 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"3a6531b7a71ead9ba41921822995cf180b9099b3f798fb351c5a7b17032b2dc8\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="3a6531b7a71ead9ba41921822995cf180b9099b3f798fb351c5a7b17032b2dc8" Oct 29 04:41:11.831901 kubelet[1975]: E1029 04:41:11.831749 1975 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"3a6531b7a71ead9ba41921822995cf180b9099b3f798fb351c5a7b17032b2dc8"} Oct 29 04:41:11.831901 kubelet[1975]: E1029 04:41:11.831803 1975 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"68d50d2a-6df7-4b3f-936e-efecabf2c6a8\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3a6531b7a71ead9ba41921822995cf180b9099b3f798fb351c5a7b17032b2dc8\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 29 04:41:11.831901 kubelet[1975]: E1029 04:41:11.831848 1975 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"68d50d2a-6df7-4b3f-936e-efecabf2c6a8\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3a6531b7a71ead9ba41921822995cf180b9099b3f798fb351c5a7b17032b2dc8\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-668d6bf9bc-5zwgd" podUID="68d50d2a-6df7-4b3f-936e-efecabf2c6a8" Oct 29 04:41:11.872511 env[1204]: time="2025-10-29T04:41:11.871436167Z" level=error msg="StopPodSandbox for \"88d9253440278e9e8c1a4e68f7af94c4f9992df0826ca49cf0f4efe7518bc226\" failed" error="failed to destroy network for sandbox \"88d9253440278e9e8c1a4e68f7af94c4f9992df0826ca49cf0f4efe7518bc226\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 29 04:41:11.872777 kubelet[1975]: E1029 04:41:11.872109 1975 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"88d9253440278e9e8c1a4e68f7af94c4f9992df0826ca49cf0f4efe7518bc226\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="88d9253440278e9e8c1a4e68f7af94c4f9992df0826ca49cf0f4efe7518bc226" Oct 29 04:41:11.872777 kubelet[1975]: E1029 04:41:11.872190 1975 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"88d9253440278e9e8c1a4e68f7af94c4f9992df0826ca49cf0f4efe7518bc226"} Oct 29 04:41:11.872777 kubelet[1975]: E1029 04:41:11.872336 1975 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"34882139-256c-45b8-b83c-22ae2a3a6d10\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"88d9253440278e9e8c1a4e68f7af94c4f9992df0826ca49cf0f4efe7518bc226\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 29 04:41:11.872777 kubelet[1975]: E1029 04:41:11.872381 1975 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"34882139-256c-45b8-b83c-22ae2a3a6d10\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"88d9253440278e9e8c1a4e68f7af94c4f9992df0826ca49cf0f4efe7518bc226\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-668d6bf9bc-gdp2b" podUID="34882139-256c-45b8-b83c-22ae2a3a6d10" Oct 29 04:41:11.896489 env[1204]: time="2025-10-29T04:41:11.896321590Z" level=error msg="StopPodSandbox for \"ad374dbade8f660d240b0bb0f068c77b921938093f528426596eab6f65d685eb\" failed" error="failed to destroy network for sandbox \"ad374dbade8f660d240b0bb0f068c77b921938093f528426596eab6f65d685eb\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 29 04:41:11.897315 kubelet[1975]: E1029 04:41:11.897035 1975 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"ad374dbade8f660d240b0bb0f068c77b921938093f528426596eab6f65d685eb\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="ad374dbade8f660d240b0bb0f068c77b921938093f528426596eab6f65d685eb" Oct 29 04:41:11.897315 kubelet[1975]: E1029 04:41:11.897120 1975 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"ad374dbade8f660d240b0bb0f068c77b921938093f528426596eab6f65d685eb"} Oct 29 04:41:11.897315 kubelet[1975]: E1029 04:41:11.897183 1975 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"7c4e2a15-2feb-448f-b8ed-a786076858ec\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"ad374dbade8f660d240b0bb0f068c77b921938093f528426596eab6f65d685eb\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 29 04:41:11.897315 kubelet[1975]: E1029 04:41:11.897231 1975 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"7c4e2a15-2feb-448f-b8ed-a786076858ec\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"ad374dbade8f660d240b0bb0f068c77b921938093f528426596eab6f65d685eb\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-76dd6544c7-psclk" podUID="7c4e2a15-2feb-448f-b8ed-a786076858ec" Oct 29 04:41:11.914314 env[1204]: time="2025-10-29T04:41:11.914212635Z" level=error msg="StopPodSandbox for \"0a766542938c9a629ef7c3f9b499f1b8c875a6f90bffcd4c7cfd1b1f50f55132\" failed" error="failed to destroy network for sandbox \"0a766542938c9a629ef7c3f9b499f1b8c875a6f90bffcd4c7cfd1b1f50f55132\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 29 04:41:11.914976 kubelet[1975]: E1029 04:41:11.914725 1975 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"0a766542938c9a629ef7c3f9b499f1b8c875a6f90bffcd4c7cfd1b1f50f55132\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="0a766542938c9a629ef7c3f9b499f1b8c875a6f90bffcd4c7cfd1b1f50f55132" Oct 29 04:41:11.914976 kubelet[1975]: E1029 04:41:11.914810 1975 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"0a766542938c9a629ef7c3f9b499f1b8c875a6f90bffcd4c7cfd1b1f50f55132"} Oct 29 04:41:11.914976 kubelet[1975]: E1029 04:41:11.914871 1975 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"57e20c90-b794-43c0-9bb8-52537b32f5f1\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0a766542938c9a629ef7c3f9b499f1b8c875a6f90bffcd4c7cfd1b1f50f55132\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 29 04:41:11.914976 kubelet[1975]: E1029 04:41:11.914906 1975 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"57e20c90-b794-43c0-9bb8-52537b32f5f1\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0a766542938c9a629ef7c3f9b499f1b8c875a6f90bffcd4c7cfd1b1f50f55132\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/whisker-5bfb84f6-jwthd" podUID="57e20c90-b794-43c0-9bb8-52537b32f5f1" Oct 29 04:41:11.924674 env[1204]: time="2025-10-29T04:41:11.924513346Z" level=error msg="StopPodSandbox for \"9041a05e02e36ff51f1c8c799085046320ea35c39cca48c649c91630527e9528\" failed" error="failed to destroy network for sandbox \"9041a05e02e36ff51f1c8c799085046320ea35c39cca48c649c91630527e9528\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 29 04:41:11.925140 kubelet[1975]: E1029 04:41:11.924926 1975 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"9041a05e02e36ff51f1c8c799085046320ea35c39cca48c649c91630527e9528\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="9041a05e02e36ff51f1c8c799085046320ea35c39cca48c649c91630527e9528" Oct 29 04:41:11.925140 kubelet[1975]: E1029 04:41:11.924978 1975 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"9041a05e02e36ff51f1c8c799085046320ea35c39cca48c649c91630527e9528"} Oct 29 04:41:11.925140 kubelet[1975]: E1029 04:41:11.925040 1975 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"78135185-6b36-431d-89d1-d452e0f3a516\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9041a05e02e36ff51f1c8c799085046320ea35c39cca48c649c91630527e9528\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 29 04:41:11.925140 kubelet[1975]: E1029 04:41:11.925090 1975 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"78135185-6b36-431d-89d1-d452e0f3a516\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9041a05e02e36ff51f1c8c799085046320ea35c39cca48c649c91630527e9528\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-d8hbp" podUID="78135185-6b36-431d-89d1-d452e0f3a516" Oct 29 04:41:11.929000 audit[3086]: NETFILTER_CFG table=filter:103 family=2 entries=21 op=nft_register_rule pid=3086 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 29 04:41:11.929000 audit[3086]: SYSCALL arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7fff65351640 a2=0 a3=7fff6535162c items=0 ppid=2117 pid=3086 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:11.929000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 29 04:41:11.933000 audit[3086]: NETFILTER_CFG table=nat:104 family=2 entries=19 op=nft_register_chain pid=3086 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 29 04:41:11.933000 audit[3086]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7fff65351640 a2=0 a3=7fff6535162c items=0 ppid=2117 pid=3086 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:11.933000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 29 04:41:11.938925 env[1204]: time="2025-10-29T04:41:11.938857159Z" level=error msg="StopPodSandbox for \"7323a19d860bb5d74cbd57031ef5356f707ee0b8a4838c99c2c88581a95a96ea\" failed" error="failed to destroy network for sandbox \"7323a19d860bb5d74cbd57031ef5356f707ee0b8a4838c99c2c88581a95a96ea\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 29 04:41:11.939569 kubelet[1975]: E1029 04:41:11.939304 1975 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"7323a19d860bb5d74cbd57031ef5356f707ee0b8a4838c99c2c88581a95a96ea\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="7323a19d860bb5d74cbd57031ef5356f707ee0b8a4838c99c2c88581a95a96ea" Oct 29 04:41:11.939569 kubelet[1975]: E1029 04:41:11.939391 1975 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"7323a19d860bb5d74cbd57031ef5356f707ee0b8a4838c99c2c88581a95a96ea"} Oct 29 04:41:11.939569 kubelet[1975]: E1029 04:41:11.939452 1975 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"4809fb25-1663-4bc2-b12f-599470e2bb91\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7323a19d860bb5d74cbd57031ef5356f707ee0b8a4838c99c2c88581a95a96ea\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 29 04:41:11.939569 kubelet[1975]: E1029 04:41:11.939496 1975 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"4809fb25-1663-4bc2-b12f-599470e2bb91\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7323a19d860bb5d74cbd57031ef5356f707ee0b8a4838c99c2c88581a95a96ea\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/goldmane-666569f655-w7zrh" podUID="4809fb25-1663-4bc2-b12f-599470e2bb91" Oct 29 04:41:11.944383 env[1204]: time="2025-10-29T04:41:11.944330019Z" level=error msg="StopPodSandbox for \"e60a5ca3dace57260718564cf1200a77eea8f638b71cc553b50495e72983c2f5\" failed" error="failed to destroy network for sandbox \"e60a5ca3dace57260718564cf1200a77eea8f638b71cc553b50495e72983c2f5\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 29 04:41:11.944921 kubelet[1975]: E1029 04:41:11.944723 1975 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"e60a5ca3dace57260718564cf1200a77eea8f638b71cc553b50495e72983c2f5\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="e60a5ca3dace57260718564cf1200a77eea8f638b71cc553b50495e72983c2f5" Oct 29 04:41:11.944921 kubelet[1975]: E1029 04:41:11.944774 1975 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"e60a5ca3dace57260718564cf1200a77eea8f638b71cc553b50495e72983c2f5"} Oct 29 04:41:11.944921 kubelet[1975]: E1029 04:41:11.944812 1975 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"c55cf193-f032-43fb-94cc-3208d0f6de96\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e60a5ca3dace57260718564cf1200a77eea8f638b71cc553b50495e72983c2f5\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 29 04:41:11.944921 kubelet[1975]: E1029 04:41:11.944858 1975 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"c55cf193-f032-43fb-94cc-3208d0f6de96\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e60a5ca3dace57260718564cf1200a77eea8f638b71cc553b50495e72983c2f5\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-66b476d74-9x56r" podUID="c55cf193-f032-43fb-94cc-3208d0f6de96" Oct 29 04:41:22.248100 env[1204]: time="2025-10-29T04:41:22.247830186Z" level=info msg="StopPodSandbox for \"3a6531b7a71ead9ba41921822995cf180b9099b3f798fb351c5a7b17032b2dc8\"" Oct 29 04:41:22.259745 env[1204]: time="2025-10-29T04:41:22.259668621Z" level=info msg="StopPodSandbox for \"0a766542938c9a629ef7c3f9b499f1b8c875a6f90bffcd4c7cfd1b1f50f55132\"" Oct 29 04:41:22.435181 env[1204]: time="2025-10-29T04:41:22.435023934Z" level=error msg="StopPodSandbox for \"3a6531b7a71ead9ba41921822995cf180b9099b3f798fb351c5a7b17032b2dc8\" failed" error="failed to destroy network for sandbox \"3a6531b7a71ead9ba41921822995cf180b9099b3f798fb351c5a7b17032b2dc8\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 29 04:41:22.436878 kubelet[1975]: E1029 04:41:22.436141 1975 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"3a6531b7a71ead9ba41921822995cf180b9099b3f798fb351c5a7b17032b2dc8\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="3a6531b7a71ead9ba41921822995cf180b9099b3f798fb351c5a7b17032b2dc8" Oct 29 04:41:22.436878 kubelet[1975]: E1029 04:41:22.436436 1975 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"3a6531b7a71ead9ba41921822995cf180b9099b3f798fb351c5a7b17032b2dc8"} Oct 29 04:41:22.436878 kubelet[1975]: E1029 04:41:22.436643 1975 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"68d50d2a-6df7-4b3f-936e-efecabf2c6a8\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3a6531b7a71ead9ba41921822995cf180b9099b3f798fb351c5a7b17032b2dc8\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 29 04:41:22.436878 kubelet[1975]: E1029 04:41:22.436771 1975 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"68d50d2a-6df7-4b3f-936e-efecabf2c6a8\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3a6531b7a71ead9ba41921822995cf180b9099b3f798fb351c5a7b17032b2dc8\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-668d6bf9bc-5zwgd" podUID="68d50d2a-6df7-4b3f-936e-efecabf2c6a8" Oct 29 04:41:22.447700 env[1204]: time="2025-10-29T04:41:22.446617535Z" level=error msg="StopPodSandbox for \"0a766542938c9a629ef7c3f9b499f1b8c875a6f90bffcd4c7cfd1b1f50f55132\" failed" error="failed to destroy network for sandbox \"0a766542938c9a629ef7c3f9b499f1b8c875a6f90bffcd4c7cfd1b1f50f55132\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 29 04:41:22.448384 kubelet[1975]: E1029 04:41:22.448249 1975 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"0a766542938c9a629ef7c3f9b499f1b8c875a6f90bffcd4c7cfd1b1f50f55132\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="0a766542938c9a629ef7c3f9b499f1b8c875a6f90bffcd4c7cfd1b1f50f55132" Oct 29 04:41:22.448513 kubelet[1975]: E1029 04:41:22.448425 1975 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"0a766542938c9a629ef7c3f9b499f1b8c875a6f90bffcd4c7cfd1b1f50f55132"} Oct 29 04:41:22.448594 kubelet[1975]: E1029 04:41:22.448511 1975 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"57e20c90-b794-43c0-9bb8-52537b32f5f1\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0a766542938c9a629ef7c3f9b499f1b8c875a6f90bffcd4c7cfd1b1f50f55132\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 29 04:41:22.448594 kubelet[1975]: E1029 04:41:22.448567 1975 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"57e20c90-b794-43c0-9bb8-52537b32f5f1\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0a766542938c9a629ef7c3f9b499f1b8c875a6f90bffcd4c7cfd1b1f50f55132\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/whisker-5bfb84f6-jwthd" podUID="57e20c90-b794-43c0-9bb8-52537b32f5f1" Oct 29 04:41:23.403000 audit[1862]: AVC avc: denied { watch } for pid=1862 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526395 scontext=system_u:system_r:svirt_lxc_net_t:s0:c163,c778 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 29 04:41:23.408553 kernel: kauditd_printk_skb: 40 callbacks suppressed Oct 29 04:41:23.409483 kernel: audit: type=1400 audit(1761712883.403:1023): avc: denied { watch } for pid=1862 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526395 scontext=system_u:system_r:svirt_lxc_net_t:s0:c163,c778 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 29 04:41:23.404000 audit[1862]: AVC avc: denied { watch } for pid=1862 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526389 scontext=system_u:system_r:svirt_lxc_net_t:s0:c163,c778 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 29 04:41:23.403000 audit[1862]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000a51b90 a2=fc6 a3=0 items=0 ppid=1710 pid=1862 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c163,c778 key=(null) Oct 29 04:41:23.428050 kernel: audit: type=1400 audit(1761712883.404:1022): avc: denied { watch } for pid=1862 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526389 scontext=system_u:system_r:svirt_lxc_net_t:s0:c163,c778 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 29 04:41:23.428179 kernel: audit: type=1300 audit(1761712883.403:1023): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000a51b90 a2=fc6 a3=0 items=0 ppid=1710 pid=1862 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c163,c778 key=(null) Oct 29 04:41:23.428254 kernel: audit: type=1327 audit(1761712883.403:1023): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 29 04:41:23.403000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 29 04:41:23.404000 audit[1862]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001776900 a2=fc6 a3=0 items=0 ppid=1710 pid=1862 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c163,c778 key=(null) Oct 29 04:41:23.457151 kernel: audit: type=1300 audit(1761712883.404:1022): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001776900 a2=fc6 a3=0 items=0 ppid=1710 pid=1862 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c163,c778 key=(null) Oct 29 04:41:23.404000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 29 04:41:23.464633 kernel: audit: type=1327 audit(1761712883.404:1022): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 29 04:41:23.972116 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1152694117.mount: Deactivated successfully. Oct 29 04:41:24.020000 audit[1830]: AVC avc: denied { watch } for pid=1830 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526395 scontext=system_u:system_r:svirt_lxc_net_t:s0:c727,c953 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 29 04:41:24.029641 kernel: audit: type=1400 audit(1761712884.020:1024): avc: denied { watch } for pid=1830 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526395 scontext=system_u:system_r:svirt_lxc_net_t:s0:c727,c953 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 29 04:41:24.020000 audit[1830]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c00fff8240 a2=fc6 a3=0 items=0 ppid=1689 pid=1830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c727,c953 key=(null) Oct 29 04:41:24.038642 kernel: audit: type=1300 audit(1761712884.020:1024): arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c00fff8240 a2=fc6 a3=0 items=0 ppid=1689 pid=1830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c727,c953 key=(null) Oct 29 04:41:24.020000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E34332E323330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 29 04:41:24.047671 kernel: audit: type=1327 audit(1761712884.020:1024): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E34332E323330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 29 04:41:24.039000 audit[1830]: AVC avc: denied { watch } for pid=1830 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526389 scontext=system_u:system_r:svirt_lxc_net_t:s0:c727,c953 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 29 04:41:24.039000 audit[1830]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c00dfc13a0 a2=fc6 a3=0 items=0 ppid=1689 pid=1830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c727,c953 key=(null) Oct 29 04:41:24.039000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E34332E323330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 29 04:41:24.039000 audit[1830]: AVC avc: denied { watch } for pid=1830 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=526391 scontext=system_u:system_r:svirt_lxc_net_t:s0:c727,c953 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 29 04:41:24.054720 kernel: audit: type=1400 audit(1761712884.039:1025): avc: denied { watch } for pid=1830 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526389 scontext=system_u:system_r:svirt_lxc_net_t:s0:c727,c953 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 29 04:41:24.039000 audit[1830]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c00fb435c0 a2=fc6 a3=0 items=0 ppid=1689 pid=1830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c727,c953 key=(null) Oct 29 04:41:24.039000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E34332E323330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 29 04:41:24.047000 audit[1830]: AVC avc: denied { watch } for pid=1830 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526395 scontext=system_u:system_r:svirt_lxc_net_t:s0:c727,c953 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 29 04:41:24.047000 audit[1830]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c00fff8390 a2=fc6 a3=0 items=0 ppid=1689 pid=1830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c727,c953 key=(null) Oct 29 04:41:24.047000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E34332E323330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 29 04:41:24.047000 audit[1830]: AVC avc: denied { watch } for pid=1830 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=526397 scontext=system_u:system_r:svirt_lxc_net_t:s0:c727,c953 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 29 04:41:24.047000 audit[1830]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c00fff83f0 a2=fc6 a3=0 items=0 ppid=1689 pid=1830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c727,c953 key=(null) Oct 29 04:41:24.047000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E34332E323330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 29 04:41:24.067106 env[1204]: time="2025-10-29T04:41:24.067000445Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 04:41:24.077737 env[1204]: time="2025-10-29T04:41:24.077683709Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:833e8e11d9dc187377eab6f31e275114a6b0f8f0afc3bf578a2a00507e85afc9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 04:41:24.079546 env[1204]: time="2025-10-29T04:41:24.079512914Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.30.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 04:41:24.081370 env[1204]: time="2025-10-29T04:41:24.081323300Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:e92cca333202c87d07bf57f38182fd68f0779f912ef55305eda1fccc9f33667c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Oct 29 04:41:24.082274 env[1204]: time="2025-10-29T04:41:24.082235932Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.4\" returns image reference \"sha256:833e8e11d9dc187377eab6f31e275114a6b0f8f0afc3bf578a2a00507e85afc9\"" Oct 29 04:41:24.136000 audit[1830]: AVC avc: denied { watch } for pid=1830 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526389 scontext=system_u:system_r:svirt_lxc_net_t:s0:c727,c953 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 29 04:41:24.136000 audit[1830]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c00e14c700 a2=fc6 a3=0 items=0 ppid=1689 pid=1830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c727,c953 key=(null) Oct 29 04:41:24.136000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E34332E323330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 29 04:41:24.145130 env[1204]: time="2025-10-29T04:41:24.145057603Z" level=info msg="CreateContainer within sandbox \"561f6f6f6a1fd1641f18c74ac0ce4f2879ece3bee43710f2292f56784a3e69fa\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Oct 29 04:41:24.170836 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1723390909.mount: Deactivated successfully. Oct 29 04:41:24.176832 env[1204]: time="2025-10-29T04:41:24.176736364Z" level=info msg="CreateContainer within sandbox \"561f6f6f6a1fd1641f18c74ac0ce4f2879ece3bee43710f2292f56784a3e69fa\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"718f1414e59e15bf8d5f3cfb5462f3988d8530a53845c908ed2f1a8a59917d5e\"" Oct 29 04:41:24.180315 env[1204]: time="2025-10-29T04:41:24.179186801Z" level=info msg="StartContainer for \"718f1414e59e15bf8d5f3cfb5462f3988d8530a53845c908ed2f1a8a59917d5e\"" Oct 29 04:41:24.233009 systemd[1]: Started cri-containerd-718f1414e59e15bf8d5f3cfb5462f3988d8530a53845c908ed2f1a8a59917d5e.scope. Oct 29 04:41:24.247665 env[1204]: time="2025-10-29T04:41:24.247581708Z" level=info msg="StopPodSandbox for \"818044961d5e8b93ed26f933b4aeb46a7e4f17d66029e564ee97f0fbc4f7b009\"" Oct 29 04:41:24.312000 audit[3133]: AVC avc: denied { perfmon } for pid=3133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:24.312000 audit[3133]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f8e71227bd8 items=0 ppid=2460 pid=3133 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:24.312000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731386631343134653539653135626638643566336366623534363266 Oct 29 04:41:24.313000 audit[3133]: AVC avc: denied { bpf } for pid=3133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:24.313000 audit[3133]: AVC avc: denied { bpf } for pid=3133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:24.313000 audit[3133]: AVC avc: denied { bpf } for pid=3133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:24.313000 audit[3133]: AVC avc: denied { perfmon } for pid=3133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:24.313000 audit[3133]: AVC avc: denied { perfmon } for pid=3133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:24.313000 audit[3133]: AVC avc: denied { perfmon } for pid=3133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:24.313000 audit[3133]: AVC avc: denied { perfmon } for pid=3133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:24.313000 audit[3133]: AVC avc: denied { perfmon } for pid=3133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:24.313000 audit[3133]: AVC avc: denied { bpf } for pid=3133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:24.313000 audit[3133]: AVC avc: denied { bpf } for pid=3133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:24.313000 audit: BPF prog-id=136 op=LOAD Oct 29 04:41:24.313000 audit[3133]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0000a16e8 items=0 ppid=2460 pid=3133 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:24.313000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731386631343134653539653135626638643566336366623534363266 Oct 29 04:41:24.316000 audit[3133]: AVC avc: denied { bpf } for pid=3133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:24.316000 audit[3133]: AVC avc: denied { bpf } for pid=3133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:24.316000 audit[3133]: AVC avc: denied { perfmon } for pid=3133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:24.316000 audit[3133]: AVC avc: denied { perfmon } for pid=3133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:24.316000 audit[3133]: AVC avc: denied { perfmon } for pid=3133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:24.316000 audit[3133]: AVC avc: denied { perfmon } for pid=3133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:24.316000 audit[3133]: AVC avc: denied { perfmon } for pid=3133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:24.316000 audit[3133]: AVC avc: denied { bpf } for pid=3133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:24.316000 audit[3133]: AVC avc: denied { bpf } for pid=3133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:24.316000 audit: BPF prog-id=137 op=LOAD Oct 29 04:41:24.316000 audit[3133]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0000a1738 items=0 ppid=2460 pid=3133 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:24.316000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731386631343134653539653135626638643566336366623534363266 Oct 29 04:41:24.318000 audit: BPF prog-id=137 op=UNLOAD Oct 29 04:41:24.318000 audit: BPF prog-id=136 op=UNLOAD Oct 29 04:41:24.319000 audit[3133]: AVC avc: denied { bpf } for pid=3133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:24.319000 audit[3133]: AVC avc: denied { bpf } for pid=3133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:24.319000 audit[3133]: AVC avc: denied { bpf } for pid=3133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:24.319000 audit[3133]: AVC avc: denied { perfmon } for pid=3133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:24.319000 audit[3133]: AVC avc: denied { perfmon } for pid=3133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:24.319000 audit[3133]: AVC avc: denied { perfmon } for pid=3133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:24.319000 audit[3133]: AVC avc: denied { perfmon } for pid=3133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:24.319000 audit[3133]: AVC avc: denied { perfmon } for pid=3133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:24.319000 audit[3133]: AVC avc: denied { bpf } for pid=3133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:24.319000 audit[3133]: AVC avc: denied { bpf } for pid=3133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:24.319000 audit: BPF prog-id=138 op=LOAD Oct 29 04:41:24.319000 audit[3133]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0000a17c8 items=0 ppid=2460 pid=3133 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:24.319000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731386631343134653539653135626638643566336366623534363266 Oct 29 04:41:24.336439 env[1204]: time="2025-10-29T04:41:24.336365598Z" level=error msg="StopPodSandbox for \"818044961d5e8b93ed26f933b4aeb46a7e4f17d66029e564ee97f0fbc4f7b009\" failed" error="failed to destroy network for sandbox \"818044961d5e8b93ed26f933b4aeb46a7e4f17d66029e564ee97f0fbc4f7b009\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 29 04:41:24.336716 kubelet[1975]: E1029 04:41:24.336627 1975 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"818044961d5e8b93ed26f933b4aeb46a7e4f17d66029e564ee97f0fbc4f7b009\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="818044961d5e8b93ed26f933b4aeb46a7e4f17d66029e564ee97f0fbc4f7b009" Oct 29 04:41:24.337333 kubelet[1975]: E1029 04:41:24.336765 1975 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"818044961d5e8b93ed26f933b4aeb46a7e4f17d66029e564ee97f0fbc4f7b009"} Oct 29 04:41:24.337333 kubelet[1975]: E1029 04:41:24.336850 1975 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"9af229d2-d1e1-477e-9280-265e378cba4b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"818044961d5e8b93ed26f933b4aeb46a7e4f17d66029e564ee97f0fbc4f7b009\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 29 04:41:24.337333 kubelet[1975]: E1029 04:41:24.336894 1975 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"9af229d2-d1e1-477e-9280-265e378cba4b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"818044961d5e8b93ed26f933b4aeb46a7e4f17d66029e564ee97f0fbc4f7b009\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-66b476d74-xnzfh" podUID="9af229d2-d1e1-477e-9280-265e378cba4b" Oct 29 04:41:24.352859 env[1204]: time="2025-10-29T04:41:24.352794124Z" level=info msg="StartContainer for \"718f1414e59e15bf8d5f3cfb5462f3988d8530a53845c908ed2f1a8a59917d5e\" returns successfully" Oct 29 04:41:25.037673 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Oct 29 04:41:25.038000 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Oct 29 04:41:25.247362 env[1204]: time="2025-10-29T04:41:25.247265496Z" level=info msg="StopPodSandbox for \"e60a5ca3dace57260718564cf1200a77eea8f638b71cc553b50495e72983c2f5\"" Oct 29 04:41:25.304746 env[1204]: time="2025-10-29T04:41:25.304159292Z" level=error msg="StopPodSandbox for \"e60a5ca3dace57260718564cf1200a77eea8f638b71cc553b50495e72983c2f5\" failed" error="failed to destroy network for sandbox \"e60a5ca3dace57260718564cf1200a77eea8f638b71cc553b50495e72983c2f5\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Oct 29 04:41:25.305586 kubelet[1975]: E1029 04:41:25.305253 1975 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"e60a5ca3dace57260718564cf1200a77eea8f638b71cc553b50495e72983c2f5\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="e60a5ca3dace57260718564cf1200a77eea8f638b71cc553b50495e72983c2f5" Oct 29 04:41:25.305586 kubelet[1975]: E1029 04:41:25.305345 1975 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"e60a5ca3dace57260718564cf1200a77eea8f638b71cc553b50495e72983c2f5"} Oct 29 04:41:25.305586 kubelet[1975]: E1029 04:41:25.305439 1975 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"c55cf193-f032-43fb-94cc-3208d0f6de96\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e60a5ca3dace57260718564cf1200a77eea8f638b71cc553b50495e72983c2f5\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Oct 29 04:41:25.305586 kubelet[1975]: E1029 04:41:25.305507 1975 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"c55cf193-f032-43fb-94cc-3208d0f6de96\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e60a5ca3dace57260718564cf1200a77eea8f638b71cc553b50495e72983c2f5\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-66b476d74-9x56r" podUID="c55cf193-f032-43fb-94cc-3208d0f6de96" Oct 29 04:41:25.495983 kubelet[1975]: I1029 04:41:25.493362 1975 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-2snls" podStartSLOduration=2.677029174 podStartE2EDuration="32.490241144s" podCreationTimestamp="2025-10-29 04:40:53 +0000 UTC" firstStartedPulling="2025-10-29 04:40:54.271813128 +0000 UTC m=+25.436881060" lastFinishedPulling="2025-10-29 04:41:24.085025104 +0000 UTC m=+55.250093030" observedRunningTime="2025-10-29 04:41:24.829638771 +0000 UTC m=+55.994706720" watchObservedRunningTime="2025-10-29 04:41:25.490241144 +0000 UTC m=+56.655309093" Oct 29 04:41:25.499713 env[1204]: time="2025-10-29T04:41:25.499657351Z" level=info msg="StopPodSandbox for \"0a766542938c9a629ef7c3f9b499f1b8c875a6f90bffcd4c7cfd1b1f50f55132\"" Oct 29 04:41:25.800261 systemd[1]: run-containerd-runc-k8s.io-718f1414e59e15bf8d5f3cfb5462f3988d8530a53845c908ed2f1a8a59917d5e-runc.o6So0L.mount: Deactivated successfully. Oct 29 04:41:25.962846 env[1204]: 2025-10-29 04:41:25.674 [INFO][3238] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="0a766542938c9a629ef7c3f9b499f1b8c875a6f90bffcd4c7cfd1b1f50f55132" Oct 29 04:41:25.962846 env[1204]: 2025-10-29 04:41:25.675 [INFO][3238] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="0a766542938c9a629ef7c3f9b499f1b8c875a6f90bffcd4c7cfd1b1f50f55132" iface="eth0" netns="/var/run/netns/cni-58a8cea0-148e-92fb-e92d-ca26c1063788" Oct 29 04:41:25.962846 env[1204]: 2025-10-29 04:41:25.675 [INFO][3238] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="0a766542938c9a629ef7c3f9b499f1b8c875a6f90bffcd4c7cfd1b1f50f55132" iface="eth0" netns="/var/run/netns/cni-58a8cea0-148e-92fb-e92d-ca26c1063788" Oct 29 04:41:25.962846 env[1204]: 2025-10-29 04:41:25.678 [INFO][3238] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="0a766542938c9a629ef7c3f9b499f1b8c875a6f90bffcd4c7cfd1b1f50f55132" iface="eth0" netns="/var/run/netns/cni-58a8cea0-148e-92fb-e92d-ca26c1063788" Oct 29 04:41:25.962846 env[1204]: 2025-10-29 04:41:25.678 [INFO][3238] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="0a766542938c9a629ef7c3f9b499f1b8c875a6f90bffcd4c7cfd1b1f50f55132" Oct 29 04:41:25.962846 env[1204]: 2025-10-29 04:41:25.678 [INFO][3238] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="0a766542938c9a629ef7c3f9b499f1b8c875a6f90bffcd4c7cfd1b1f50f55132" Oct 29 04:41:25.962846 env[1204]: 2025-10-29 04:41:25.937 [INFO][3245] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="0a766542938c9a629ef7c3f9b499f1b8c875a6f90bffcd4c7cfd1b1f50f55132" HandleID="k8s-pod-network.0a766542938c9a629ef7c3f9b499f1b8c875a6f90bffcd4c7cfd1b1f50f55132" Workload="srv--jtkau.gb1.brightbox.com-k8s-whisker--5bfb84f6--jwthd-eth0" Oct 29 04:41:25.962846 env[1204]: 2025-10-29 04:41:25.940 [INFO][3245] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 29 04:41:25.962846 env[1204]: 2025-10-29 04:41:25.940 [INFO][3245] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 29 04:41:25.962846 env[1204]: 2025-10-29 04:41:25.955 [WARNING][3245] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="0a766542938c9a629ef7c3f9b499f1b8c875a6f90bffcd4c7cfd1b1f50f55132" HandleID="k8s-pod-network.0a766542938c9a629ef7c3f9b499f1b8c875a6f90bffcd4c7cfd1b1f50f55132" Workload="srv--jtkau.gb1.brightbox.com-k8s-whisker--5bfb84f6--jwthd-eth0" Oct 29 04:41:25.962846 env[1204]: 2025-10-29 04:41:25.955 [INFO][3245] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="0a766542938c9a629ef7c3f9b499f1b8c875a6f90bffcd4c7cfd1b1f50f55132" HandleID="k8s-pod-network.0a766542938c9a629ef7c3f9b499f1b8c875a6f90bffcd4c7cfd1b1f50f55132" Workload="srv--jtkau.gb1.brightbox.com-k8s-whisker--5bfb84f6--jwthd-eth0" Oct 29 04:41:25.962846 env[1204]: 2025-10-29 04:41:25.958 [INFO][3245] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 29 04:41:25.962846 env[1204]: 2025-10-29 04:41:25.960 [INFO][3238] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="0a766542938c9a629ef7c3f9b499f1b8c875a6f90bffcd4c7cfd1b1f50f55132" Oct 29 04:41:25.971503 env[1204]: time="2025-10-29T04:41:25.969340713Z" level=info msg="TearDown network for sandbox \"0a766542938c9a629ef7c3f9b499f1b8c875a6f90bffcd4c7cfd1b1f50f55132\" successfully" Oct 29 04:41:25.971503 env[1204]: time="2025-10-29T04:41:25.969387109Z" level=info msg="StopPodSandbox for \"0a766542938c9a629ef7c3f9b499f1b8c875a6f90bffcd4c7cfd1b1f50f55132\" returns successfully" Oct 29 04:41:25.966844 systemd[1]: run-netns-cni\x2d58a8cea0\x2d148e\x2d92fb\x2de92d\x2dca26c1063788.mount: Deactivated successfully. Oct 29 04:41:26.048574 kubelet[1975]: I1029 04:41:26.047942 1975 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/57e20c90-b794-43c0-9bb8-52537b32f5f1-whisker-ca-bundle\") pod \"57e20c90-b794-43c0-9bb8-52537b32f5f1\" (UID: \"57e20c90-b794-43c0-9bb8-52537b32f5f1\") " Oct 29 04:41:26.048837 kubelet[1975]: I1029 04:41:26.048596 1975 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/57e20c90-b794-43c0-9bb8-52537b32f5f1-whisker-backend-key-pair\") pod \"57e20c90-b794-43c0-9bb8-52537b32f5f1\" (UID: \"57e20c90-b794-43c0-9bb8-52537b32f5f1\") " Oct 29 04:41:26.048837 kubelet[1975]: I1029 04:41:26.048651 1975 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"kube-api-access-6jl24\" (UniqueName: \"kubernetes.io/projected/57e20c90-b794-43c0-9bb8-52537b32f5f1-kube-api-access-6jl24\") pod \"57e20c90-b794-43c0-9bb8-52537b32f5f1\" (UID: \"57e20c90-b794-43c0-9bb8-52537b32f5f1\") " Oct 29 04:41:26.056154 kubelet[1975]: I1029 04:41:26.052897 1975 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/57e20c90-b794-43c0-9bb8-52537b32f5f1-whisker-ca-bundle" (OuterVolumeSpecName: "whisker-ca-bundle") pod "57e20c90-b794-43c0-9bb8-52537b32f5f1" (UID: "57e20c90-b794-43c0-9bb8-52537b32f5f1"). InnerVolumeSpecName "whisker-ca-bundle". PluginName "kubernetes.io/configmap", VolumeGIDValue "" Oct 29 04:41:26.067933 systemd[1]: var-lib-kubelet-pods-57e20c90\x2db794\x2d43c0\x2d9bb8\x2d52537b32f5f1-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2d6jl24.mount: Deactivated successfully. Oct 29 04:41:26.073032 systemd[1]: var-lib-kubelet-pods-57e20c90\x2db794\x2d43c0\x2d9bb8\x2d52537b32f5f1-volumes-kubernetes.io\x7esecret-whisker\x2dbackend\x2dkey\x2dpair.mount: Deactivated successfully. Oct 29 04:41:26.077160 kubelet[1975]: I1029 04:41:26.077100 1975 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/57e20c90-b794-43c0-9bb8-52537b32f5f1-whisker-backend-key-pair" (OuterVolumeSpecName: "whisker-backend-key-pair") pod "57e20c90-b794-43c0-9bb8-52537b32f5f1" (UID: "57e20c90-b794-43c0-9bb8-52537b32f5f1"). InnerVolumeSpecName "whisker-backend-key-pair". PluginName "kubernetes.io/secret", VolumeGIDValue "" Oct 29 04:41:26.078234 kubelet[1975]: I1029 04:41:26.078171 1975 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/57e20c90-b794-43c0-9bb8-52537b32f5f1-kube-api-access-6jl24" (OuterVolumeSpecName: "kube-api-access-6jl24") pod "57e20c90-b794-43c0-9bb8-52537b32f5f1" (UID: "57e20c90-b794-43c0-9bb8-52537b32f5f1"). InnerVolumeSpecName "kube-api-access-6jl24". PluginName "kubernetes.io/projected", VolumeGIDValue "" Oct 29 04:41:26.151437 kubelet[1975]: I1029 04:41:26.151374 1975 reconciler_common.go:299] "Volume detached for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/57e20c90-b794-43c0-9bb8-52537b32f5f1-whisker-ca-bundle\") on node \"srv-jtkau.gb1.brightbox.com\" DevicePath \"\"" Oct 29 04:41:26.151437 kubelet[1975]: I1029 04:41:26.151435 1975 reconciler_common.go:299] "Volume detached for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/57e20c90-b794-43c0-9bb8-52537b32f5f1-whisker-backend-key-pair\") on node \"srv-jtkau.gb1.brightbox.com\" DevicePath \"\"" Oct 29 04:41:26.151824 kubelet[1975]: I1029 04:41:26.151456 1975 reconciler_common.go:299] "Volume detached for volume \"kube-api-access-6jl24\" (UniqueName: \"kubernetes.io/projected/57e20c90-b794-43c0-9bb8-52537b32f5f1-kube-api-access-6jl24\") on node \"srv-jtkau.gb1.brightbox.com\" DevicePath \"\"" Oct 29 04:41:26.246979 env[1204]: time="2025-10-29T04:41:26.246080800Z" level=info msg="StopPodSandbox for \"9041a05e02e36ff51f1c8c799085046320ea35c39cca48c649c91630527e9528\"" Oct 29 04:41:26.445547 env[1204]: 2025-10-29 04:41:26.357 [INFO][3296] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="9041a05e02e36ff51f1c8c799085046320ea35c39cca48c649c91630527e9528" Oct 29 04:41:26.445547 env[1204]: 2025-10-29 04:41:26.358 [INFO][3296] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="9041a05e02e36ff51f1c8c799085046320ea35c39cca48c649c91630527e9528" iface="eth0" netns="/var/run/netns/cni-1eb2e889-a2c6-58b7-6259-7c4503cce495" Oct 29 04:41:26.445547 env[1204]: 2025-10-29 04:41:26.358 [INFO][3296] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="9041a05e02e36ff51f1c8c799085046320ea35c39cca48c649c91630527e9528" iface="eth0" netns="/var/run/netns/cni-1eb2e889-a2c6-58b7-6259-7c4503cce495" Oct 29 04:41:26.445547 env[1204]: 2025-10-29 04:41:26.358 [INFO][3296] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="9041a05e02e36ff51f1c8c799085046320ea35c39cca48c649c91630527e9528" iface="eth0" netns="/var/run/netns/cni-1eb2e889-a2c6-58b7-6259-7c4503cce495" Oct 29 04:41:26.445547 env[1204]: 2025-10-29 04:41:26.358 [INFO][3296] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="9041a05e02e36ff51f1c8c799085046320ea35c39cca48c649c91630527e9528" Oct 29 04:41:26.445547 env[1204]: 2025-10-29 04:41:26.358 [INFO][3296] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="9041a05e02e36ff51f1c8c799085046320ea35c39cca48c649c91630527e9528" Oct 29 04:41:26.445547 env[1204]: 2025-10-29 04:41:26.411 [INFO][3303] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="9041a05e02e36ff51f1c8c799085046320ea35c39cca48c649c91630527e9528" HandleID="k8s-pod-network.9041a05e02e36ff51f1c8c799085046320ea35c39cca48c649c91630527e9528" Workload="srv--jtkau.gb1.brightbox.com-k8s-csi--node--driver--d8hbp-eth0" Oct 29 04:41:26.445547 env[1204]: 2025-10-29 04:41:26.417 [INFO][3303] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 29 04:41:26.445547 env[1204]: 2025-10-29 04:41:26.417 [INFO][3303] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 29 04:41:26.445547 env[1204]: 2025-10-29 04:41:26.436 [WARNING][3303] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="9041a05e02e36ff51f1c8c799085046320ea35c39cca48c649c91630527e9528" HandleID="k8s-pod-network.9041a05e02e36ff51f1c8c799085046320ea35c39cca48c649c91630527e9528" Workload="srv--jtkau.gb1.brightbox.com-k8s-csi--node--driver--d8hbp-eth0" Oct 29 04:41:26.445547 env[1204]: 2025-10-29 04:41:26.436 [INFO][3303] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="9041a05e02e36ff51f1c8c799085046320ea35c39cca48c649c91630527e9528" HandleID="k8s-pod-network.9041a05e02e36ff51f1c8c799085046320ea35c39cca48c649c91630527e9528" Workload="srv--jtkau.gb1.brightbox.com-k8s-csi--node--driver--d8hbp-eth0" Oct 29 04:41:26.445547 env[1204]: 2025-10-29 04:41:26.439 [INFO][3303] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 29 04:41:26.445547 env[1204]: 2025-10-29 04:41:26.443 [INFO][3296] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="9041a05e02e36ff51f1c8c799085046320ea35c39cca48c649c91630527e9528" Oct 29 04:41:26.451154 systemd[1]: run-netns-cni\x2d1eb2e889\x2da2c6\x2d58b7\x2d6259\x2d7c4503cce495.mount: Deactivated successfully. Oct 29 04:41:26.452946 env[1204]: time="2025-10-29T04:41:26.452894683Z" level=info msg="TearDown network for sandbox \"9041a05e02e36ff51f1c8c799085046320ea35c39cca48c649c91630527e9528\" successfully" Oct 29 04:41:26.453101 env[1204]: time="2025-10-29T04:41:26.453067982Z" level=info msg="StopPodSandbox for \"9041a05e02e36ff51f1c8c799085046320ea35c39cca48c649c91630527e9528\" returns successfully" Oct 29 04:41:26.454476 env[1204]: time="2025-10-29T04:41:26.454438948Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-d8hbp,Uid:78135185-6b36-431d-89d1-d452e0f3a516,Namespace:calico-system,Attempt:1,}" Oct 29 04:41:26.770285 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Oct 29 04:41:26.770597 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali680f84ab990: link becomes ready Oct 29 04:41:26.782866 systemd[1]: Removed slice kubepods-besteffort-pod57e20c90_b794_43c0_9bb8_52537b32f5f1.slice. Oct 29 04:41:26.800937 systemd-networkd[1018]: cali680f84ab990: Link UP Oct 29 04:41:26.801381 systemd-networkd[1018]: cali680f84ab990: Gained carrier Oct 29 04:41:26.826336 env[1204]: 2025-10-29 04:41:26.548 [INFO][3309] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist Oct 29 04:41:26.826336 env[1204]: 2025-10-29 04:41:26.576 [INFO][3309] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {srv--jtkau.gb1.brightbox.com-k8s-csi--node--driver--d8hbp-eth0 csi-node-driver- calico-system 78135185-6b36-431d-89d1-d452e0f3a516 916 0 2025-10-29 04:40:53 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:857b56db8f k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s srv-jtkau.gb1.brightbox.com csi-node-driver-d8hbp eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali680f84ab990 [] [] }} ContainerID="b3cf47911057c0124c626fa7b3421742a296ba41d4c81c6cc2476d9d97284bef" Namespace="calico-system" Pod="csi-node-driver-d8hbp" WorkloadEndpoint="srv--jtkau.gb1.brightbox.com-k8s-csi--node--driver--d8hbp-" Oct 29 04:41:26.826336 env[1204]: 2025-10-29 04:41:26.578 [INFO][3309] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="b3cf47911057c0124c626fa7b3421742a296ba41d4c81c6cc2476d9d97284bef" Namespace="calico-system" Pod="csi-node-driver-d8hbp" WorkloadEndpoint="srv--jtkau.gb1.brightbox.com-k8s-csi--node--driver--d8hbp-eth0" Oct 29 04:41:26.826336 env[1204]: 2025-10-29 04:41:26.647 [INFO][3322] ipam/ipam_plugin.go 227: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="b3cf47911057c0124c626fa7b3421742a296ba41d4c81c6cc2476d9d97284bef" HandleID="k8s-pod-network.b3cf47911057c0124c626fa7b3421742a296ba41d4c81c6cc2476d9d97284bef" Workload="srv--jtkau.gb1.brightbox.com-k8s-csi--node--driver--d8hbp-eth0" Oct 29 04:41:26.826336 env[1204]: 2025-10-29 04:41:26.648 [INFO][3322] ipam/ipam_plugin.go 275: Auto assigning IP ContainerID="b3cf47911057c0124c626fa7b3421742a296ba41d4c81c6cc2476d9d97284bef" HandleID="k8s-pod-network.b3cf47911057c0124c626fa7b3421742a296ba41d4c81c6cc2476d9d97284bef" Workload="srv--jtkau.gb1.brightbox.com-k8s-csi--node--driver--d8hbp-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003253a0), Attrs:map[string]string{"namespace":"calico-system", "node":"srv-jtkau.gb1.brightbox.com", "pod":"csi-node-driver-d8hbp", "timestamp":"2025-10-29 04:41:26.647256359 +0000 UTC"}, Hostname:"srv-jtkau.gb1.brightbox.com", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 29 04:41:26.826336 env[1204]: 2025-10-29 04:41:26.648 [INFO][3322] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 29 04:41:26.826336 env[1204]: 2025-10-29 04:41:26.648 [INFO][3322] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 29 04:41:26.826336 env[1204]: 2025-10-29 04:41:26.648 [INFO][3322] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'srv-jtkau.gb1.brightbox.com' Oct 29 04:41:26.826336 env[1204]: 2025-10-29 04:41:26.666 [INFO][3322] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.b3cf47911057c0124c626fa7b3421742a296ba41d4c81c6cc2476d9d97284bef" host="srv-jtkau.gb1.brightbox.com" Oct 29 04:41:26.826336 env[1204]: 2025-10-29 04:41:26.689 [INFO][3322] ipam/ipam.go 394: Looking up existing affinities for host host="srv-jtkau.gb1.brightbox.com" Oct 29 04:41:26.826336 env[1204]: 2025-10-29 04:41:26.700 [INFO][3322] ipam/ipam.go 511: Trying affinity for 192.168.110.192/26 host="srv-jtkau.gb1.brightbox.com" Oct 29 04:41:26.826336 env[1204]: 2025-10-29 04:41:26.703 [INFO][3322] ipam/ipam.go 158: Attempting to load block cidr=192.168.110.192/26 host="srv-jtkau.gb1.brightbox.com" Oct 29 04:41:26.826336 env[1204]: 2025-10-29 04:41:26.707 [INFO][3322] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.110.192/26 host="srv-jtkau.gb1.brightbox.com" Oct 29 04:41:26.826336 env[1204]: 2025-10-29 04:41:26.707 [INFO][3322] ipam/ipam.go 1219: Attempting to assign 1 addresses from block block=192.168.110.192/26 handle="k8s-pod-network.b3cf47911057c0124c626fa7b3421742a296ba41d4c81c6cc2476d9d97284bef" host="srv-jtkau.gb1.brightbox.com" Oct 29 04:41:26.826336 env[1204]: 2025-10-29 04:41:26.709 [INFO][3322] ipam/ipam.go 1780: Creating new handle: k8s-pod-network.b3cf47911057c0124c626fa7b3421742a296ba41d4c81c6cc2476d9d97284bef Oct 29 04:41:26.826336 env[1204]: 2025-10-29 04:41:26.715 [INFO][3322] ipam/ipam.go 1246: Writing block in order to claim IPs block=192.168.110.192/26 handle="k8s-pod-network.b3cf47911057c0124c626fa7b3421742a296ba41d4c81c6cc2476d9d97284bef" host="srv-jtkau.gb1.brightbox.com" Oct 29 04:41:26.826336 env[1204]: 2025-10-29 04:41:26.727 [INFO][3322] ipam/ipam.go 1262: Successfully claimed IPs: [192.168.110.193/26] block=192.168.110.192/26 handle="k8s-pod-network.b3cf47911057c0124c626fa7b3421742a296ba41d4c81c6cc2476d9d97284bef" host="srv-jtkau.gb1.brightbox.com" Oct 29 04:41:26.826336 env[1204]: 2025-10-29 04:41:26.727 [INFO][3322] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.110.193/26] handle="k8s-pod-network.b3cf47911057c0124c626fa7b3421742a296ba41d4c81c6cc2476d9d97284bef" host="srv-jtkau.gb1.brightbox.com" Oct 29 04:41:26.826336 env[1204]: 2025-10-29 04:41:26.727 [INFO][3322] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 29 04:41:26.826336 env[1204]: 2025-10-29 04:41:26.727 [INFO][3322] ipam/ipam_plugin.go 299: Calico CNI IPAM assigned addresses IPv4=[192.168.110.193/26] IPv6=[] ContainerID="b3cf47911057c0124c626fa7b3421742a296ba41d4c81c6cc2476d9d97284bef" HandleID="k8s-pod-network.b3cf47911057c0124c626fa7b3421742a296ba41d4c81c6cc2476d9d97284bef" Workload="srv--jtkau.gb1.brightbox.com-k8s-csi--node--driver--d8hbp-eth0" Oct 29 04:41:26.828285 env[1204]: 2025-10-29 04:41:26.730 [INFO][3309] cni-plugin/k8s.go 418: Populated endpoint ContainerID="b3cf47911057c0124c626fa7b3421742a296ba41d4c81c6cc2476d9d97284bef" Namespace="calico-system" Pod="csi-node-driver-d8hbp" WorkloadEndpoint="srv--jtkau.gb1.brightbox.com-k8s-csi--node--driver--d8hbp-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--jtkau.gb1.brightbox.com-k8s-csi--node--driver--d8hbp-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"78135185-6b36-431d-89d1-d452e0f3a516", ResourceVersion:"916", Generation:0, CreationTimestamp:time.Date(2025, time.October, 29, 4, 40, 53, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"857b56db8f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-jtkau.gb1.brightbox.com", ContainerID:"", Pod:"csi-node-driver-d8hbp", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.110.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali680f84ab990", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 29 04:41:26.828285 env[1204]: 2025-10-29 04:41:26.730 [INFO][3309] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.110.193/32] ContainerID="b3cf47911057c0124c626fa7b3421742a296ba41d4c81c6cc2476d9d97284bef" Namespace="calico-system" Pod="csi-node-driver-d8hbp" WorkloadEndpoint="srv--jtkau.gb1.brightbox.com-k8s-csi--node--driver--d8hbp-eth0" Oct 29 04:41:26.828285 env[1204]: 2025-10-29 04:41:26.730 [INFO][3309] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali680f84ab990 ContainerID="b3cf47911057c0124c626fa7b3421742a296ba41d4c81c6cc2476d9d97284bef" Namespace="calico-system" Pod="csi-node-driver-d8hbp" WorkloadEndpoint="srv--jtkau.gb1.brightbox.com-k8s-csi--node--driver--d8hbp-eth0" Oct 29 04:41:26.828285 env[1204]: 2025-10-29 04:41:26.775 [INFO][3309] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="b3cf47911057c0124c626fa7b3421742a296ba41d4c81c6cc2476d9d97284bef" Namespace="calico-system" Pod="csi-node-driver-d8hbp" WorkloadEndpoint="srv--jtkau.gb1.brightbox.com-k8s-csi--node--driver--d8hbp-eth0" Oct 29 04:41:26.828285 env[1204]: 2025-10-29 04:41:26.779 [INFO][3309] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="b3cf47911057c0124c626fa7b3421742a296ba41d4c81c6cc2476d9d97284bef" Namespace="calico-system" Pod="csi-node-driver-d8hbp" WorkloadEndpoint="srv--jtkau.gb1.brightbox.com-k8s-csi--node--driver--d8hbp-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--jtkau.gb1.brightbox.com-k8s-csi--node--driver--d8hbp-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"78135185-6b36-431d-89d1-d452e0f3a516", ResourceVersion:"916", Generation:0, CreationTimestamp:time.Date(2025, time.October, 29, 4, 40, 53, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"857b56db8f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-jtkau.gb1.brightbox.com", ContainerID:"b3cf47911057c0124c626fa7b3421742a296ba41d4c81c6cc2476d9d97284bef", Pod:"csi-node-driver-d8hbp", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.110.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali680f84ab990", MAC:"c2:37:86:80:1f:10", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 29 04:41:26.828285 env[1204]: 2025-10-29 04:41:26.819 [INFO][3309] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="b3cf47911057c0124c626fa7b3421742a296ba41d4c81c6cc2476d9d97284bef" Namespace="calico-system" Pod="csi-node-driver-d8hbp" WorkloadEndpoint="srv--jtkau.gb1.brightbox.com-k8s-csi--node--driver--d8hbp-eth0" Oct 29 04:41:26.874339 env[1204]: time="2025-10-29T04:41:26.873048745Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 29 04:41:26.874339 env[1204]: time="2025-10-29T04:41:26.873793268Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 29 04:41:26.874339 env[1204]: time="2025-10-29T04:41:26.873820201Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 29 04:41:26.876123 env[1204]: time="2025-10-29T04:41:26.876023843Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b3cf47911057c0124c626fa7b3421742a296ba41d4c81c6cc2476d9d97284bef pid=3341 runtime=io.containerd.runc.v2 Oct 29 04:41:26.909115 systemd[1]: Started cri-containerd-b3cf47911057c0124c626fa7b3421742a296ba41d4c81c6cc2476d9d97284bef.scope. Oct 29 04:41:26.972078 systemd[1]: Created slice kubepods-besteffort-podf101f74a_91c5_460d_8026_7c7655b6a631.slice. Oct 29 04:41:27.015000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:27.015000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:27.015000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:27.015000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:27.015000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:27.015000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:27.015000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:27.015000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:27.015000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:27.015000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:27.015000 audit: BPF prog-id=139 op=LOAD Oct 29 04:41:27.016000 audit[3352]: AVC avc: denied { bpf } for pid=3352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:27.016000 audit[3352]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3341 pid=3352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:27.016000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233636634373931313035376330313234633632366661376233343231 Oct 29 04:41:27.016000 audit[3352]: AVC avc: denied { perfmon } for pid=3352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:27.016000 audit[3352]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3341 pid=3352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:27.016000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233636634373931313035376330313234633632366661376233343231 Oct 29 04:41:27.016000 audit[3352]: AVC avc: denied { bpf } for pid=3352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:27.016000 audit[3352]: AVC avc: denied { bpf } for pid=3352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:27.016000 audit[3352]: AVC avc: denied { bpf } for pid=3352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:27.016000 audit[3352]: AVC avc: denied { perfmon } for pid=3352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:27.016000 audit[3352]: AVC avc: denied { perfmon } for pid=3352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:27.016000 audit[3352]: AVC avc: denied { perfmon } for pid=3352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:27.016000 audit[3352]: AVC avc: denied { perfmon } for pid=3352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:27.016000 audit[3352]: AVC avc: denied { perfmon } for pid=3352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:27.016000 audit[3352]: AVC avc: denied { bpf } for pid=3352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:27.016000 audit[3352]: AVC avc: denied { bpf } for pid=3352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:27.016000 audit: BPF prog-id=140 op=LOAD Oct 29 04:41:27.016000 audit[3352]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000927e0 items=0 ppid=3341 pid=3352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:27.016000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233636634373931313035376330313234633632366661376233343231 Oct 29 04:41:27.016000 audit[3352]: AVC avc: denied { bpf } for pid=3352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:27.016000 audit[3352]: AVC avc: denied { bpf } for pid=3352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:27.016000 audit[3352]: AVC avc: denied { perfmon } for pid=3352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:27.016000 audit[3352]: AVC avc: denied { perfmon } for pid=3352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:27.016000 audit[3352]: AVC avc: denied { perfmon } for pid=3352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:27.016000 audit[3352]: AVC avc: denied { perfmon } for pid=3352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:27.016000 audit[3352]: AVC avc: denied { perfmon } for pid=3352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:27.016000 audit[3352]: AVC avc: denied { bpf } for pid=3352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:27.016000 audit[3352]: AVC avc: denied { bpf } for pid=3352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:27.016000 audit: BPF prog-id=141 op=LOAD Oct 29 04:41:27.016000 audit[3352]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000092828 items=0 ppid=3341 pid=3352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:27.016000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233636634373931313035376330313234633632366661376233343231 Oct 29 04:41:27.016000 audit: BPF prog-id=141 op=UNLOAD Oct 29 04:41:27.016000 audit: BPF prog-id=140 op=UNLOAD Oct 29 04:41:27.016000 audit[3352]: AVC avc: denied { bpf } for pid=3352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:27.016000 audit[3352]: AVC avc: denied { bpf } for pid=3352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:27.016000 audit[3352]: AVC avc: denied { bpf } for pid=3352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:27.016000 audit[3352]: AVC avc: denied { perfmon } for pid=3352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:27.016000 audit[3352]: AVC avc: denied { perfmon } for pid=3352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:27.016000 audit[3352]: AVC avc: denied { perfmon } for pid=3352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:27.016000 audit[3352]: AVC avc: denied { perfmon } for pid=3352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:27.016000 audit[3352]: AVC avc: denied { perfmon } for pid=3352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:27.016000 audit[3352]: AVC avc: denied { bpf } for pid=3352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:27.016000 audit[3352]: AVC avc: denied { bpf } for pid=3352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:27.016000 audit: BPF prog-id=142 op=LOAD Oct 29 04:41:27.016000 audit[3352]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000092c38 items=0 ppid=3341 pid=3352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:27.016000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233636634373931313035376330313234633632366661376233343231 Oct 29 04:41:27.036774 env[1204]: time="2025-10-29T04:41:27.036526681Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-d8hbp,Uid:78135185-6b36-431d-89d1-d452e0f3a516,Namespace:calico-system,Attempt:1,} returns sandbox id \"b3cf47911057c0124c626fa7b3421742a296ba41d4c81c6cc2476d9d97284bef\"" Oct 29 04:41:27.046219 env[1204]: time="2025-10-29T04:41:27.046178111Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.4\"" Oct 29 04:41:27.080046 kubelet[1975]: I1029 04:41:27.079667 1975 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/f101f74a-91c5-460d-8026-7c7655b6a631-whisker-ca-bundle\") pod \"whisker-7fbcdbccd-mghcv\" (UID: \"f101f74a-91c5-460d-8026-7c7655b6a631\") " pod="calico-system/whisker-7fbcdbccd-mghcv" Oct 29 04:41:27.080046 kubelet[1975]: I1029 04:41:27.079861 1975 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-rq4tk\" (UniqueName: \"kubernetes.io/projected/f101f74a-91c5-460d-8026-7c7655b6a631-kube-api-access-rq4tk\") pod \"whisker-7fbcdbccd-mghcv\" (UID: \"f101f74a-91c5-460d-8026-7c7655b6a631\") " pod="calico-system/whisker-7fbcdbccd-mghcv" Oct 29 04:41:27.080046 kubelet[1975]: I1029 04:41:27.079947 1975 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/f101f74a-91c5-460d-8026-7c7655b6a631-whisker-backend-key-pair\") pod \"whisker-7fbcdbccd-mghcv\" (UID: \"f101f74a-91c5-460d-8026-7c7655b6a631\") " pod="calico-system/whisker-7fbcdbccd-mghcv" Oct 29 04:41:27.245731 env[1204]: time="2025-10-29T04:41:27.245640140Z" level=info msg="StopPodSandbox for \"ad374dbade8f660d240b0bb0f068c77b921938093f528426596eab6f65d685eb\"" Oct 29 04:41:27.247680 env[1204]: time="2025-10-29T04:41:27.247624993Z" level=info msg="StopPodSandbox for \"88d9253440278e9e8c1a4e68f7af94c4f9992df0826ca49cf0f4efe7518bc226\"" Oct 29 04:41:27.249383 env[1204]: time="2025-10-29T04:41:27.249337010Z" level=info msg="StopPodSandbox for \"7323a19d860bb5d74cbd57031ef5356f707ee0b8a4838c99c2c88581a95a96ea\"" Oct 29 04:41:27.262135 kubelet[1975]: I1029 04:41:27.259976 1975 kubelet_volumes.go:163] "Cleaned up orphaned pod volumes dir" podUID="57e20c90-b794-43c0-9bb8-52537b32f5f1" path="/var/lib/kubelet/pods/57e20c90-b794-43c0-9bb8-52537b32f5f1/volumes" Oct 29 04:41:27.282087 env[1204]: time="2025-10-29T04:41:27.282027364Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-7fbcdbccd-mghcv,Uid:f101f74a-91c5-460d-8026-7c7655b6a631,Namespace:calico-system,Attempt:0,}" Oct 29 04:41:27.361000 audit[3467]: AVC avc: denied { write } for pid=3467 comm="tee" name="fd" dev="proc" ino=30605 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 29 04:41:27.361000 audit[3467]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc6a9aa7b6 a2=241 a3=1b6 items=1 ppid=3384 pid=3467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:27.361000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Oct 29 04:41:27.361000 audit: PATH item=0 name="/dev/fd/63" inode=30583 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:41:27.361000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 29 04:41:27.364000 audit[3472]: AVC avc: denied { write } for pid=3472 comm="tee" name="fd" dev="proc" ino=30609 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 29 04:41:27.364000 audit[3472]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcbaae77c6 a2=241 a3=1b6 items=1 ppid=3395 pid=3472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:27.364000 audit: CWD cwd="/etc/service/enabled/bird/log" Oct 29 04:41:27.364000 audit: PATH item=0 name="/dev/fd/63" inode=30590 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:41:27.364000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 29 04:41:27.372000 audit[3474]: AVC avc: denied { write } for pid=3474 comm="tee" name="fd" dev="proc" ino=30613 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 29 04:41:27.372000 audit[3474]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcec4427b5 a2=241 a3=1b6 items=1 ppid=3396 pid=3474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:27.372000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Oct 29 04:41:27.372000 audit: PATH item=0 name="/dev/fd/63" inode=30593 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:41:27.372000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 29 04:41:27.382547 env[1204]: time="2025-10-29T04:41:27.382478312Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 29 04:41:27.384280 env[1204]: time="2025-10-29T04:41:27.384045312Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" Oct 29 04:41:27.387183 kubelet[1975]: E1029 04:41:27.385725 1975 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" image="ghcr.io/flatcar/calico/csi:v3.30.4" Oct 29 04:41:27.387183 kubelet[1975]: E1029 04:41:27.387079 1975 kuberuntime_image.go:55] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" image="ghcr.io/flatcar/calico/csi:v3.30.4" Oct 29 04:41:27.392646 kubelet[1975]: E1029 04:41:27.392520 1975 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.30.4,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-h67bl,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*true,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:*false,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*true,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-d8hbp_calico-system(78135185-6b36-431d-89d1-d452e0f3a516): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" logger="UnhandledError" Oct 29 04:41:27.396419 env[1204]: time="2025-10-29T04:41:27.396354598Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\"" Oct 29 04:41:27.406000 audit[3479]: AVC avc: denied { write } for pid=3479 comm="tee" name="fd" dev="proc" ino=30625 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 29 04:41:27.406000 audit[3479]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcb05077c5 a2=241 a3=1b6 items=1 ppid=3388 pid=3479 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:27.406000 audit: CWD cwd="/etc/service/enabled/bird6/log" Oct 29 04:41:27.406000 audit: PATH item=0 name="/dev/fd/63" inode=30598 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:41:27.406000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 29 04:41:27.441000 audit[3489]: AVC avc: denied { write } for pid=3489 comm="tee" name="fd" dev="proc" ino=30633 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 29 04:41:27.441000 audit[3489]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe7c6b47c5 a2=241 a3=1b6 items=1 ppid=3391 pid=3489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:27.441000 audit: CWD cwd="/etc/service/enabled/felix/log" Oct 29 04:41:27.441000 audit: PATH item=0 name="/dev/fd/63" inode=30620 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:41:27.441000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 29 04:41:27.468000 audit[3495]: AVC avc: denied { write } for pid=3495 comm="tee" name="fd" dev="proc" ino=30641 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 29 04:41:27.468000 audit[3495]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd01cfe7c5 a2=241 a3=1b6 items=1 ppid=3390 pid=3495 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:27.468000 audit: CWD cwd="/etc/service/enabled/confd/log" Oct 29 04:41:27.468000 audit: PATH item=0 name="/dev/fd/63" inode=30627 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:41:27.468000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 29 04:41:27.490000 audit[3502]: AVC avc: denied { write } for pid=3502 comm="tee" name="fd" dev="proc" ino=30643 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Oct 29 04:41:27.490000 audit[3502]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffa200a7c7 a2=241 a3=1b6 items=1 ppid=3410 pid=3502 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:27.490000 audit: CWD cwd="/etc/service/enabled/cni/log" Oct 29 04:41:27.490000 audit: PATH item=0 name="/dev/fd/63" inode=30628 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Oct 29 04:41:27.490000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Oct 29 04:41:27.723266 env[1204]: time="2025-10-29T04:41:27.723173077Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 29 04:41:27.736464 env[1204]: time="2025-10-29T04:41:27.736354055Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" Oct 29 04:41:27.741453 kubelet[1975]: E1029 04:41:27.740315 1975 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4" Oct 29 04:41:27.741453 kubelet[1975]: E1029 04:41:27.740644 1975 kuberuntime_image.go:55] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4" Oct 29 04:41:27.741453 kubelet[1975]: E1029 04:41:27.741306 1975 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-h67bl,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*true,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:*false,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*true,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-d8hbp_calico-system(78135185-6b36-431d-89d1-d452e0f3a516): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" logger="UnhandledError" Oct 29 04:41:27.743560 kubelet[1975]: E1029 04:41:27.743147 1975 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-d8hbp" podUID="78135185-6b36-431d-89d1-d452e0f3a516" Oct 29 04:41:27.798631 kubelet[1975]: E1029 04:41:27.797024 1975 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-d8hbp" podUID="78135185-6b36-431d-89d1-d452e0f3a516" Oct 29 04:41:27.896748 env[1204]: 2025-10-29 04:41:27.578 [INFO][3452] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="7323a19d860bb5d74cbd57031ef5356f707ee0b8a4838c99c2c88581a95a96ea" Oct 29 04:41:27.896748 env[1204]: 2025-10-29 04:41:27.578 [INFO][3452] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="7323a19d860bb5d74cbd57031ef5356f707ee0b8a4838c99c2c88581a95a96ea" iface="eth0" netns="/var/run/netns/cni-70ef50de-3778-ce0a-0298-e98ee755fb3d" Oct 29 04:41:27.896748 env[1204]: 2025-10-29 04:41:27.578 [INFO][3452] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="7323a19d860bb5d74cbd57031ef5356f707ee0b8a4838c99c2c88581a95a96ea" iface="eth0" netns="/var/run/netns/cni-70ef50de-3778-ce0a-0298-e98ee755fb3d" Oct 29 04:41:27.896748 env[1204]: 2025-10-29 04:41:27.580 [INFO][3452] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="7323a19d860bb5d74cbd57031ef5356f707ee0b8a4838c99c2c88581a95a96ea" iface="eth0" netns="/var/run/netns/cni-70ef50de-3778-ce0a-0298-e98ee755fb3d" Oct 29 04:41:27.896748 env[1204]: 2025-10-29 04:41:27.580 [INFO][3452] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="7323a19d860bb5d74cbd57031ef5356f707ee0b8a4838c99c2c88581a95a96ea" Oct 29 04:41:27.896748 env[1204]: 2025-10-29 04:41:27.580 [INFO][3452] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="7323a19d860bb5d74cbd57031ef5356f707ee0b8a4838c99c2c88581a95a96ea" Oct 29 04:41:27.896748 env[1204]: 2025-10-29 04:41:27.854 [INFO][3522] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="7323a19d860bb5d74cbd57031ef5356f707ee0b8a4838c99c2c88581a95a96ea" HandleID="k8s-pod-network.7323a19d860bb5d74cbd57031ef5356f707ee0b8a4838c99c2c88581a95a96ea" Workload="srv--jtkau.gb1.brightbox.com-k8s-goldmane--666569f655--w7zrh-eth0" Oct 29 04:41:27.896748 env[1204]: 2025-10-29 04:41:27.855 [INFO][3522] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 29 04:41:27.896748 env[1204]: 2025-10-29 04:41:27.856 [INFO][3522] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 29 04:41:27.896748 env[1204]: 2025-10-29 04:41:27.872 [WARNING][3522] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="7323a19d860bb5d74cbd57031ef5356f707ee0b8a4838c99c2c88581a95a96ea" HandleID="k8s-pod-network.7323a19d860bb5d74cbd57031ef5356f707ee0b8a4838c99c2c88581a95a96ea" Workload="srv--jtkau.gb1.brightbox.com-k8s-goldmane--666569f655--w7zrh-eth0" Oct 29 04:41:27.896748 env[1204]: 2025-10-29 04:41:27.873 [INFO][3522] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="7323a19d860bb5d74cbd57031ef5356f707ee0b8a4838c99c2c88581a95a96ea" HandleID="k8s-pod-network.7323a19d860bb5d74cbd57031ef5356f707ee0b8a4838c99c2c88581a95a96ea" Workload="srv--jtkau.gb1.brightbox.com-k8s-goldmane--666569f655--w7zrh-eth0" Oct 29 04:41:27.896748 env[1204]: 2025-10-29 04:41:27.878 [INFO][3522] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 29 04:41:27.896748 env[1204]: 2025-10-29 04:41:27.891 [INFO][3452] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="7323a19d860bb5d74cbd57031ef5356f707ee0b8a4838c99c2c88581a95a96ea" Oct 29 04:41:27.898532 env[1204]: time="2025-10-29T04:41:27.898441809Z" level=info msg="TearDown network for sandbox \"7323a19d860bb5d74cbd57031ef5356f707ee0b8a4838c99c2c88581a95a96ea\" successfully" Oct 29 04:41:27.898738 env[1204]: time="2025-10-29T04:41:27.898693256Z" level=info msg="StopPodSandbox for \"7323a19d860bb5d74cbd57031ef5356f707ee0b8a4838c99c2c88581a95a96ea\" returns successfully" Oct 29 04:41:27.901717 env[1204]: time="2025-10-29T04:41:27.901678620Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-666569f655-w7zrh,Uid:4809fb25-1663-4bc2-b12f-599470e2bb91,Namespace:calico-system,Attempt:1,}" Oct 29 04:41:27.938128 env[1204]: 2025-10-29 04:41:27.608 [INFO][3446] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="ad374dbade8f660d240b0bb0f068c77b921938093f528426596eab6f65d685eb" Oct 29 04:41:27.938128 env[1204]: 2025-10-29 04:41:27.608 [INFO][3446] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="ad374dbade8f660d240b0bb0f068c77b921938093f528426596eab6f65d685eb" iface="eth0" netns="/var/run/netns/cni-bafe9364-0d75-a93e-757a-a16eb1a4e24b" Oct 29 04:41:27.938128 env[1204]: 2025-10-29 04:41:27.609 [INFO][3446] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="ad374dbade8f660d240b0bb0f068c77b921938093f528426596eab6f65d685eb" iface="eth0" netns="/var/run/netns/cni-bafe9364-0d75-a93e-757a-a16eb1a4e24b" Oct 29 04:41:27.938128 env[1204]: 2025-10-29 04:41:27.609 [INFO][3446] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="ad374dbade8f660d240b0bb0f068c77b921938093f528426596eab6f65d685eb" iface="eth0" netns="/var/run/netns/cni-bafe9364-0d75-a93e-757a-a16eb1a4e24b" Oct 29 04:41:27.938128 env[1204]: 2025-10-29 04:41:27.609 [INFO][3446] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="ad374dbade8f660d240b0bb0f068c77b921938093f528426596eab6f65d685eb" Oct 29 04:41:27.938128 env[1204]: 2025-10-29 04:41:27.609 [INFO][3446] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="ad374dbade8f660d240b0bb0f068c77b921938093f528426596eab6f65d685eb" Oct 29 04:41:27.938128 env[1204]: 2025-10-29 04:41:27.856 [INFO][3529] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="ad374dbade8f660d240b0bb0f068c77b921938093f528426596eab6f65d685eb" HandleID="k8s-pod-network.ad374dbade8f660d240b0bb0f068c77b921938093f528426596eab6f65d685eb" Workload="srv--jtkau.gb1.brightbox.com-k8s-calico--kube--controllers--76dd6544c7--psclk-eth0" Oct 29 04:41:27.938128 env[1204]: 2025-10-29 04:41:27.862 [INFO][3529] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 29 04:41:27.938128 env[1204]: 2025-10-29 04:41:27.878 [INFO][3529] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 29 04:41:27.938128 env[1204]: 2025-10-29 04:41:27.895 [WARNING][3529] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="ad374dbade8f660d240b0bb0f068c77b921938093f528426596eab6f65d685eb" HandleID="k8s-pod-network.ad374dbade8f660d240b0bb0f068c77b921938093f528426596eab6f65d685eb" Workload="srv--jtkau.gb1.brightbox.com-k8s-calico--kube--controllers--76dd6544c7--psclk-eth0" Oct 29 04:41:27.938128 env[1204]: 2025-10-29 04:41:27.895 [INFO][3529] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="ad374dbade8f660d240b0bb0f068c77b921938093f528426596eab6f65d685eb" HandleID="k8s-pod-network.ad374dbade8f660d240b0bb0f068c77b921938093f528426596eab6f65d685eb" Workload="srv--jtkau.gb1.brightbox.com-k8s-calico--kube--controllers--76dd6544c7--psclk-eth0" Oct 29 04:41:27.938128 env[1204]: 2025-10-29 04:41:27.903 [INFO][3529] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 29 04:41:27.938128 env[1204]: 2025-10-29 04:41:27.935 [INFO][3446] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="ad374dbade8f660d240b0bb0f068c77b921938093f528426596eab6f65d685eb" Oct 29 04:41:27.946217 env[1204]: 2025-10-29 04:41:27.614 [INFO][3447] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="88d9253440278e9e8c1a4e68f7af94c4f9992df0826ca49cf0f4efe7518bc226" Oct 29 04:41:27.946217 env[1204]: 2025-10-29 04:41:27.615 [INFO][3447] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="88d9253440278e9e8c1a4e68f7af94c4f9992df0826ca49cf0f4efe7518bc226" iface="eth0" netns="/var/run/netns/cni-b7a933dd-bfd2-ad65-2a8b-be43d7f0d401" Oct 29 04:41:27.946217 env[1204]: 2025-10-29 04:41:27.624 [INFO][3447] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="88d9253440278e9e8c1a4e68f7af94c4f9992df0826ca49cf0f4efe7518bc226" iface="eth0" netns="/var/run/netns/cni-b7a933dd-bfd2-ad65-2a8b-be43d7f0d401" Oct 29 04:41:27.946217 env[1204]: 2025-10-29 04:41:27.624 [INFO][3447] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="88d9253440278e9e8c1a4e68f7af94c4f9992df0826ca49cf0f4efe7518bc226" iface="eth0" netns="/var/run/netns/cni-b7a933dd-bfd2-ad65-2a8b-be43d7f0d401" Oct 29 04:41:27.946217 env[1204]: 2025-10-29 04:41:27.625 [INFO][3447] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="88d9253440278e9e8c1a4e68f7af94c4f9992df0826ca49cf0f4efe7518bc226" Oct 29 04:41:27.946217 env[1204]: 2025-10-29 04:41:27.625 [INFO][3447] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="88d9253440278e9e8c1a4e68f7af94c4f9992df0826ca49cf0f4efe7518bc226" Oct 29 04:41:27.946217 env[1204]: 2025-10-29 04:41:27.859 [INFO][3531] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="88d9253440278e9e8c1a4e68f7af94c4f9992df0826ca49cf0f4efe7518bc226" HandleID="k8s-pod-network.88d9253440278e9e8c1a4e68f7af94c4f9992df0826ca49cf0f4efe7518bc226" Workload="srv--jtkau.gb1.brightbox.com-k8s-coredns--668d6bf9bc--gdp2b-eth0" Oct 29 04:41:27.946217 env[1204]: 2025-10-29 04:41:27.862 [INFO][3531] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 29 04:41:27.946217 env[1204]: 2025-10-29 04:41:27.904 [INFO][3531] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 29 04:41:27.946217 env[1204]: 2025-10-29 04:41:27.922 [WARNING][3531] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="88d9253440278e9e8c1a4e68f7af94c4f9992df0826ca49cf0f4efe7518bc226" HandleID="k8s-pod-network.88d9253440278e9e8c1a4e68f7af94c4f9992df0826ca49cf0f4efe7518bc226" Workload="srv--jtkau.gb1.brightbox.com-k8s-coredns--668d6bf9bc--gdp2b-eth0" Oct 29 04:41:27.946217 env[1204]: 2025-10-29 04:41:27.922 [INFO][3531] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="88d9253440278e9e8c1a4e68f7af94c4f9992df0826ca49cf0f4efe7518bc226" HandleID="k8s-pod-network.88d9253440278e9e8c1a4e68f7af94c4f9992df0826ca49cf0f4efe7518bc226" Workload="srv--jtkau.gb1.brightbox.com-k8s-coredns--668d6bf9bc--gdp2b-eth0" Oct 29 04:41:27.946217 env[1204]: 2025-10-29 04:41:27.934 [INFO][3531] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 29 04:41:27.946217 env[1204]: 2025-10-29 04:41:27.944 [INFO][3447] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="88d9253440278e9e8c1a4e68f7af94c4f9992df0826ca49cf0f4efe7518bc226" Oct 29 04:41:27.947478 env[1204]: time="2025-10-29T04:41:27.947398686Z" level=info msg="TearDown network for sandbox \"88d9253440278e9e8c1a4e68f7af94c4f9992df0826ca49cf0f4efe7518bc226\" successfully" Oct 29 04:41:27.947688 env[1204]: time="2025-10-29T04:41:27.947653274Z" level=info msg="StopPodSandbox for \"88d9253440278e9e8c1a4e68f7af94c4f9992df0826ca49cf0f4efe7518bc226\" returns successfully" Oct 29 04:41:27.947912 env[1204]: time="2025-10-29T04:41:27.947634291Z" level=info msg="TearDown network for sandbox \"ad374dbade8f660d240b0bb0f068c77b921938093f528426596eab6f65d685eb\" successfully" Oct 29 04:41:27.948151 env[1204]: time="2025-10-29T04:41:27.948113061Z" level=info msg="StopPodSandbox for \"ad374dbade8f660d240b0bb0f068c77b921938093f528426596eab6f65d685eb\" returns successfully" Oct 29 04:41:27.953650 env[1204]: time="2025-10-29T04:41:27.953588807Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-76dd6544c7-psclk,Uid:7c4e2a15-2feb-448f-b8ed-a786076858ec,Namespace:calico-system,Attempt:1,}" Oct 29 04:41:27.955215 env[1204]: time="2025-10-29T04:41:27.955167092Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-gdp2b,Uid:34882139-256c-45b8-b83c-22ae2a3a6d10,Namespace:kube-system,Attempt:1,}" Oct 29 04:41:28.077175 systemd[1]: run-netns-cni\x2d70ef50de\x2d3778\x2dce0a\x2d0298\x2de98ee755fb3d.mount: Deactivated successfully. Oct 29 04:41:28.077355 systemd[1]: run-netns-cni\x2dbafe9364\x2d0d75\x2da93e\x2d757a\x2da16eb1a4e24b.mount: Deactivated successfully. Oct 29 04:41:28.077475 systemd[1]: run-netns-cni\x2db7a933dd\x2dbfd2\x2dad65\x2d2a8b\x2dbe43d7f0d401.mount: Deactivated successfully. Oct 29 04:41:28.108719 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Oct 29 04:41:28.108970 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali59557ca3006: link becomes ready Oct 29 04:41:28.113722 systemd-networkd[1018]: cali59557ca3006: Link UP Oct 29 04:41:28.118361 systemd-networkd[1018]: cali59557ca3006: Gained carrier Oct 29 04:41:28.180214 env[1204]: 2025-10-29 04:41:27.541 [INFO][3457] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist Oct 29 04:41:28.180214 env[1204]: 2025-10-29 04:41:27.610 [INFO][3457] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {srv--jtkau.gb1.brightbox.com-k8s-whisker--7fbcdbccd--mghcv-eth0 whisker-7fbcdbccd- calico-system f101f74a-91c5-460d-8026-7c7655b6a631 934 0 2025-10-29 04:41:26 +0000 UTC map[app.kubernetes.io/name:whisker k8s-app:whisker pod-template-hash:7fbcdbccd projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:whisker] map[] [] [] []} {k8s srv-jtkau.gb1.brightbox.com whisker-7fbcdbccd-mghcv eth0 whisker [] [] [kns.calico-system ksa.calico-system.whisker] cali59557ca3006 [] [] }} ContainerID="37e55a48b6cc8e15f534d4450feb08c67d6d6510e5fa6a81b8072abde705fd4e" Namespace="calico-system" Pod="whisker-7fbcdbccd-mghcv" WorkloadEndpoint="srv--jtkau.gb1.brightbox.com-k8s-whisker--7fbcdbccd--mghcv-" Oct 29 04:41:28.180214 env[1204]: 2025-10-29 04:41:27.610 [INFO][3457] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="37e55a48b6cc8e15f534d4450feb08c67d6d6510e5fa6a81b8072abde705fd4e" Namespace="calico-system" Pod="whisker-7fbcdbccd-mghcv" WorkloadEndpoint="srv--jtkau.gb1.brightbox.com-k8s-whisker--7fbcdbccd--mghcv-eth0" Oct 29 04:41:28.180214 env[1204]: 2025-10-29 04:41:27.921 [INFO][3539] ipam/ipam_plugin.go 227: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="37e55a48b6cc8e15f534d4450feb08c67d6d6510e5fa6a81b8072abde705fd4e" HandleID="k8s-pod-network.37e55a48b6cc8e15f534d4450feb08c67d6d6510e5fa6a81b8072abde705fd4e" Workload="srv--jtkau.gb1.brightbox.com-k8s-whisker--7fbcdbccd--mghcv-eth0" Oct 29 04:41:28.180214 env[1204]: 2025-10-29 04:41:27.924 [INFO][3539] ipam/ipam_plugin.go 275: Auto assigning IP ContainerID="37e55a48b6cc8e15f534d4450feb08c67d6d6510e5fa6a81b8072abde705fd4e" HandleID="k8s-pod-network.37e55a48b6cc8e15f534d4450feb08c67d6d6510e5fa6a81b8072abde705fd4e" Workload="srv--jtkau.gb1.brightbox.com-k8s-whisker--7fbcdbccd--mghcv-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003ae070), Attrs:map[string]string{"namespace":"calico-system", "node":"srv-jtkau.gb1.brightbox.com", "pod":"whisker-7fbcdbccd-mghcv", "timestamp":"2025-10-29 04:41:27.921567785 +0000 UTC"}, Hostname:"srv-jtkau.gb1.brightbox.com", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 29 04:41:28.180214 env[1204]: 2025-10-29 04:41:27.934 [INFO][3539] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 29 04:41:28.180214 env[1204]: 2025-10-29 04:41:27.935 [INFO][3539] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 29 04:41:28.180214 env[1204]: 2025-10-29 04:41:27.935 [INFO][3539] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'srv-jtkau.gb1.brightbox.com' Oct 29 04:41:28.180214 env[1204]: 2025-10-29 04:41:27.968 [INFO][3539] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.37e55a48b6cc8e15f534d4450feb08c67d6d6510e5fa6a81b8072abde705fd4e" host="srv-jtkau.gb1.brightbox.com" Oct 29 04:41:28.180214 env[1204]: 2025-10-29 04:41:27.991 [INFO][3539] ipam/ipam.go 394: Looking up existing affinities for host host="srv-jtkau.gb1.brightbox.com" Oct 29 04:41:28.180214 env[1204]: 2025-10-29 04:41:28.013 [INFO][3539] ipam/ipam.go 511: Trying affinity for 192.168.110.192/26 host="srv-jtkau.gb1.brightbox.com" Oct 29 04:41:28.180214 env[1204]: 2025-10-29 04:41:28.020 [INFO][3539] ipam/ipam.go 158: Attempting to load block cidr=192.168.110.192/26 host="srv-jtkau.gb1.brightbox.com" Oct 29 04:41:28.180214 env[1204]: 2025-10-29 04:41:28.025 [INFO][3539] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.110.192/26 host="srv-jtkau.gb1.brightbox.com" Oct 29 04:41:28.180214 env[1204]: 2025-10-29 04:41:28.025 [INFO][3539] ipam/ipam.go 1219: Attempting to assign 1 addresses from block block=192.168.110.192/26 handle="k8s-pod-network.37e55a48b6cc8e15f534d4450feb08c67d6d6510e5fa6a81b8072abde705fd4e" host="srv-jtkau.gb1.brightbox.com" Oct 29 04:41:28.180214 env[1204]: 2025-10-29 04:41:28.037 [INFO][3539] ipam/ipam.go 1780: Creating new handle: k8s-pod-network.37e55a48b6cc8e15f534d4450feb08c67d6d6510e5fa6a81b8072abde705fd4e Oct 29 04:41:28.180214 env[1204]: 2025-10-29 04:41:28.053 [INFO][3539] ipam/ipam.go 1246: Writing block in order to claim IPs block=192.168.110.192/26 handle="k8s-pod-network.37e55a48b6cc8e15f534d4450feb08c67d6d6510e5fa6a81b8072abde705fd4e" host="srv-jtkau.gb1.brightbox.com" Oct 29 04:41:28.180214 env[1204]: 2025-10-29 04:41:28.065 [INFO][3539] ipam/ipam.go 1262: Successfully claimed IPs: [192.168.110.194/26] block=192.168.110.192/26 handle="k8s-pod-network.37e55a48b6cc8e15f534d4450feb08c67d6d6510e5fa6a81b8072abde705fd4e" host="srv-jtkau.gb1.brightbox.com" Oct 29 04:41:28.180214 env[1204]: 2025-10-29 04:41:28.065 [INFO][3539] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.110.194/26] handle="k8s-pod-network.37e55a48b6cc8e15f534d4450feb08c67d6d6510e5fa6a81b8072abde705fd4e" host="srv-jtkau.gb1.brightbox.com" Oct 29 04:41:28.180214 env[1204]: 2025-10-29 04:41:28.065 [INFO][3539] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 29 04:41:28.180214 env[1204]: 2025-10-29 04:41:28.065 [INFO][3539] ipam/ipam_plugin.go 299: Calico CNI IPAM assigned addresses IPv4=[192.168.110.194/26] IPv6=[] ContainerID="37e55a48b6cc8e15f534d4450feb08c67d6d6510e5fa6a81b8072abde705fd4e" HandleID="k8s-pod-network.37e55a48b6cc8e15f534d4450feb08c67d6d6510e5fa6a81b8072abde705fd4e" Workload="srv--jtkau.gb1.brightbox.com-k8s-whisker--7fbcdbccd--mghcv-eth0" Oct 29 04:41:28.181883 env[1204]: 2025-10-29 04:41:28.069 [INFO][3457] cni-plugin/k8s.go 418: Populated endpoint ContainerID="37e55a48b6cc8e15f534d4450feb08c67d6d6510e5fa6a81b8072abde705fd4e" Namespace="calico-system" Pod="whisker-7fbcdbccd-mghcv" WorkloadEndpoint="srv--jtkau.gb1.brightbox.com-k8s-whisker--7fbcdbccd--mghcv-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--jtkau.gb1.brightbox.com-k8s-whisker--7fbcdbccd--mghcv-eth0", GenerateName:"whisker-7fbcdbccd-", Namespace:"calico-system", SelfLink:"", UID:"f101f74a-91c5-460d-8026-7c7655b6a631", ResourceVersion:"934", Generation:0, CreationTimestamp:time.Date(2025, time.October, 29, 4, 41, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"whisker", "k8s-app":"whisker", "pod-template-hash":"7fbcdbccd", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"whisker"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-jtkau.gb1.brightbox.com", ContainerID:"", Pod:"whisker-7fbcdbccd-mghcv", Endpoint:"eth0", ServiceAccountName:"whisker", IPNetworks:[]string{"192.168.110.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.whisker"}, InterfaceName:"cali59557ca3006", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 29 04:41:28.181883 env[1204]: 2025-10-29 04:41:28.069 [INFO][3457] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.110.194/32] ContainerID="37e55a48b6cc8e15f534d4450feb08c67d6d6510e5fa6a81b8072abde705fd4e" Namespace="calico-system" Pod="whisker-7fbcdbccd-mghcv" WorkloadEndpoint="srv--jtkau.gb1.brightbox.com-k8s-whisker--7fbcdbccd--mghcv-eth0" Oct 29 04:41:28.181883 env[1204]: 2025-10-29 04:41:28.069 [INFO][3457] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali59557ca3006 ContainerID="37e55a48b6cc8e15f534d4450feb08c67d6d6510e5fa6a81b8072abde705fd4e" Namespace="calico-system" Pod="whisker-7fbcdbccd-mghcv" WorkloadEndpoint="srv--jtkau.gb1.brightbox.com-k8s-whisker--7fbcdbccd--mghcv-eth0" Oct 29 04:41:28.181883 env[1204]: 2025-10-29 04:41:28.116 [INFO][3457] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="37e55a48b6cc8e15f534d4450feb08c67d6d6510e5fa6a81b8072abde705fd4e" Namespace="calico-system" Pod="whisker-7fbcdbccd-mghcv" WorkloadEndpoint="srv--jtkau.gb1.brightbox.com-k8s-whisker--7fbcdbccd--mghcv-eth0" Oct 29 04:41:28.181883 env[1204]: 2025-10-29 04:41:28.125 [INFO][3457] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="37e55a48b6cc8e15f534d4450feb08c67d6d6510e5fa6a81b8072abde705fd4e" Namespace="calico-system" Pod="whisker-7fbcdbccd-mghcv" WorkloadEndpoint="srv--jtkau.gb1.brightbox.com-k8s-whisker--7fbcdbccd--mghcv-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--jtkau.gb1.brightbox.com-k8s-whisker--7fbcdbccd--mghcv-eth0", GenerateName:"whisker-7fbcdbccd-", Namespace:"calico-system", SelfLink:"", UID:"f101f74a-91c5-460d-8026-7c7655b6a631", ResourceVersion:"934", Generation:0, CreationTimestamp:time.Date(2025, time.October, 29, 4, 41, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"whisker", "k8s-app":"whisker", "pod-template-hash":"7fbcdbccd", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"whisker"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-jtkau.gb1.brightbox.com", ContainerID:"37e55a48b6cc8e15f534d4450feb08c67d6d6510e5fa6a81b8072abde705fd4e", Pod:"whisker-7fbcdbccd-mghcv", Endpoint:"eth0", ServiceAccountName:"whisker", IPNetworks:[]string{"192.168.110.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.whisker"}, InterfaceName:"cali59557ca3006", MAC:"1e:d1:48:b8:bc:3e", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 29 04:41:28.181883 env[1204]: 2025-10-29 04:41:28.172 [INFO][3457] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="37e55a48b6cc8e15f534d4450feb08c67d6d6510e5fa6a81b8072abde705fd4e" Namespace="calico-system" Pod="whisker-7fbcdbccd-mghcv" WorkloadEndpoint="srv--jtkau.gb1.brightbox.com-k8s-whisker--7fbcdbccd--mghcv-eth0" Oct 29 04:41:28.312186 env[1204]: time="2025-10-29T04:41:28.311978259Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 29 04:41:28.312762 env[1204]: time="2025-10-29T04:41:28.312700065Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 29 04:41:28.313013 env[1204]: time="2025-10-29T04:41:28.312954324Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 29 04:41:28.314712 env[1204]: time="2025-10-29T04:41:28.314635289Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/37e55a48b6cc8e15f534d4450feb08c67d6d6510e5fa6a81b8072abde705fd4e pid=3605 runtime=io.containerd.runc.v2 Oct 29 04:41:28.448646 kernel: kauditd_printk_skb: 149 callbacks suppressed Oct 29 04:41:28.449140 kernel: audit: type=1400 audit(1761712888.434:1061): avc: denied { watch } for pid=1862 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526389 scontext=system_u:system_r:svirt_lxc_net_t:s0:c163,c778 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 29 04:41:28.434000 audit[1862]: AVC avc: denied { watch } for pid=1862 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526389 scontext=system_u:system_r:svirt_lxc_net_t:s0:c163,c778 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 29 04:41:28.434000 audit[1862]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0013280a0 a2=fc6 a3=0 items=0 ppid=1710 pid=1862 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c163,c778 key=(null) Oct 29 04:41:28.461911 kernel: audit: type=1300 audit(1761712888.434:1061): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0013280a0 a2=fc6 a3=0 items=0 ppid=1710 pid=1862 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c163,c778 key=(null) Oct 29 04:41:28.434000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 29 04:41:28.472633 kernel: audit: type=1327 audit(1761712888.434:1061): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 29 04:41:28.453000 audit[1862]: AVC avc: denied { watch } for pid=1862 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526389 scontext=system_u:system_r:svirt_lxc_net_t:s0:c163,c778 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 29 04:41:28.480798 kernel: audit: type=1400 audit(1761712888.453:1062): avc: denied { watch } for pid=1862 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526389 scontext=system_u:system_r:svirt_lxc_net_t:s0:c163,c778 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 29 04:41:28.453000 audit[1862]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0013280c0 a2=fc6 a3=0 items=0 ppid=1710 pid=1862 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c163,c778 key=(null) Oct 29 04:41:28.497401 kernel: audit: type=1300 audit(1761712888.453:1062): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0013280c0 a2=fc6 a3=0 items=0 ppid=1710 pid=1862 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c163,c778 key=(null) Oct 29 04:41:28.453000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 29 04:41:28.520502 kernel: audit: type=1327 audit(1761712888.453:1062): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 29 04:41:28.529278 systemd[1]: run-containerd-runc-k8s.io-37e55a48b6cc8e15f534d4450feb08c67d6d6510e5fa6a81b8072abde705fd4e-runc.qgZn2f.mount: Deactivated successfully. Oct 29 04:41:28.453000 audit[1862]: AVC avc: denied { watch } for pid=1862 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526389 scontext=system_u:system_r:svirt_lxc_net_t:s0:c163,c778 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 29 04:41:28.546375 kernel: audit: type=1400 audit(1761712888.453:1063): avc: denied { watch } for pid=1862 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526389 scontext=system_u:system_r:svirt_lxc_net_t:s0:c163,c778 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 29 04:41:28.546563 kernel: audit: type=1300 audit(1761712888.453:1063): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0013280e0 a2=fc6 a3=0 items=0 ppid=1710 pid=1862 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c163,c778 key=(null) Oct 29 04:41:28.453000 audit[1862]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0013280e0 a2=fc6 a3=0 items=0 ppid=1710 pid=1862 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c163,c778 key=(null) Oct 29 04:41:28.453000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 29 04:41:28.556955 kernel: audit: type=1327 audit(1761712888.453:1063): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 29 04:41:28.561023 systemd[1]: Started cri-containerd-37e55a48b6cc8e15f534d4450feb08c67d6d6510e5fa6a81b8072abde705fd4e.scope. Oct 29 04:41:28.453000 audit[1862]: AVC avc: denied { watch } for pid=1862 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526389 scontext=system_u:system_r:svirt_lxc_net_t:s0:c163,c778 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 29 04:41:28.568797 kernel: audit: type=1400 audit(1761712888.453:1064): avc: denied { watch } for pid=1862 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526389 scontext=system_u:system_r:svirt_lxc_net_t:s0:c163,c778 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 29 04:41:28.453000 audit[1862]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001328100 a2=fc6 a3=0 items=0 ppid=1710 pid=1862 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c163,c778 key=(null) Oct 29 04:41:28.453000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 29 04:41:28.642780 systemd-networkd[1018]: calid5c4aabe7be: Link UP Oct 29 04:41:28.646024 systemd-networkd[1018]: calid5c4aabe7be: Gained carrier Oct 29 04:41:28.646628 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calid5c4aabe7be: link becomes ready Oct 29 04:41:28.693793 env[1204]: 2025-10-29 04:41:28.180 [INFO][3550] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist Oct 29 04:41:28.693793 env[1204]: 2025-10-29 04:41:28.233 [INFO][3550] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {srv--jtkau.gb1.brightbox.com-k8s-goldmane--666569f655--w7zrh-eth0 goldmane-666569f655- calico-system 4809fb25-1663-4bc2-b12f-599470e2bb91 944 0 2025-10-29 04:40:51 +0000 UTC map[app.kubernetes.io/name:goldmane k8s-app:goldmane pod-template-hash:666569f655 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:goldmane] map[] [] [] []} {k8s srv-jtkau.gb1.brightbox.com goldmane-666569f655-w7zrh eth0 goldmane [] [] [kns.calico-system ksa.calico-system.goldmane] calid5c4aabe7be [] [] }} ContainerID="35ca770c06698defa49f23e6f9d66382a18c6f83d1b53e641f7e69feaf045b81" Namespace="calico-system" Pod="goldmane-666569f655-w7zrh" WorkloadEndpoint="srv--jtkau.gb1.brightbox.com-k8s-goldmane--666569f655--w7zrh-" Oct 29 04:41:28.693793 env[1204]: 2025-10-29 04:41:28.233 [INFO][3550] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="35ca770c06698defa49f23e6f9d66382a18c6f83d1b53e641f7e69feaf045b81" Namespace="calico-system" Pod="goldmane-666569f655-w7zrh" WorkloadEndpoint="srv--jtkau.gb1.brightbox.com-k8s-goldmane--666569f655--w7zrh-eth0" Oct 29 04:41:28.693793 env[1204]: 2025-10-29 04:41:28.388 [INFO][3595] ipam/ipam_plugin.go 227: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="35ca770c06698defa49f23e6f9d66382a18c6f83d1b53e641f7e69feaf045b81" HandleID="k8s-pod-network.35ca770c06698defa49f23e6f9d66382a18c6f83d1b53e641f7e69feaf045b81" Workload="srv--jtkau.gb1.brightbox.com-k8s-goldmane--666569f655--w7zrh-eth0" Oct 29 04:41:28.693793 env[1204]: 2025-10-29 04:41:28.388 [INFO][3595] ipam/ipam_plugin.go 275: Auto assigning IP ContainerID="35ca770c06698defa49f23e6f9d66382a18c6f83d1b53e641f7e69feaf045b81" HandleID="k8s-pod-network.35ca770c06698defa49f23e6f9d66382a18c6f83d1b53e641f7e69feaf045b81" Workload="srv--jtkau.gb1.brightbox.com-k8s-goldmane--666569f655--w7zrh-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00030bca0), Attrs:map[string]string{"namespace":"calico-system", "node":"srv-jtkau.gb1.brightbox.com", "pod":"goldmane-666569f655-w7zrh", "timestamp":"2025-10-29 04:41:28.388183141 +0000 UTC"}, Hostname:"srv-jtkau.gb1.brightbox.com", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 29 04:41:28.693793 env[1204]: 2025-10-29 04:41:28.388 [INFO][3595] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 29 04:41:28.693793 env[1204]: 2025-10-29 04:41:28.389 [INFO][3595] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 29 04:41:28.693793 env[1204]: 2025-10-29 04:41:28.389 [INFO][3595] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'srv-jtkau.gb1.brightbox.com' Oct 29 04:41:28.693793 env[1204]: 2025-10-29 04:41:28.432 [INFO][3595] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.35ca770c06698defa49f23e6f9d66382a18c6f83d1b53e641f7e69feaf045b81" host="srv-jtkau.gb1.brightbox.com" Oct 29 04:41:28.693793 env[1204]: 2025-10-29 04:41:28.507 [INFO][3595] ipam/ipam.go 394: Looking up existing affinities for host host="srv-jtkau.gb1.brightbox.com" Oct 29 04:41:28.693793 env[1204]: 2025-10-29 04:41:28.574 [INFO][3595] ipam/ipam.go 511: Trying affinity for 192.168.110.192/26 host="srv-jtkau.gb1.brightbox.com" Oct 29 04:41:28.693793 env[1204]: 2025-10-29 04:41:28.584 [INFO][3595] ipam/ipam.go 158: Attempting to load block cidr=192.168.110.192/26 host="srv-jtkau.gb1.brightbox.com" Oct 29 04:41:28.693793 env[1204]: 2025-10-29 04:41:28.590 [INFO][3595] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.110.192/26 host="srv-jtkau.gb1.brightbox.com" Oct 29 04:41:28.693793 env[1204]: 2025-10-29 04:41:28.590 [INFO][3595] ipam/ipam.go 1219: Attempting to assign 1 addresses from block block=192.168.110.192/26 handle="k8s-pod-network.35ca770c06698defa49f23e6f9d66382a18c6f83d1b53e641f7e69feaf045b81" host="srv-jtkau.gb1.brightbox.com" Oct 29 04:41:28.693793 env[1204]: 2025-10-29 04:41:28.593 [INFO][3595] ipam/ipam.go 1780: Creating new handle: k8s-pod-network.35ca770c06698defa49f23e6f9d66382a18c6f83d1b53e641f7e69feaf045b81 Oct 29 04:41:28.693793 env[1204]: 2025-10-29 04:41:28.601 [INFO][3595] ipam/ipam.go 1246: Writing block in order to claim IPs block=192.168.110.192/26 handle="k8s-pod-network.35ca770c06698defa49f23e6f9d66382a18c6f83d1b53e641f7e69feaf045b81" host="srv-jtkau.gb1.brightbox.com" Oct 29 04:41:28.693793 env[1204]: 2025-10-29 04:41:28.612 [INFO][3595] ipam/ipam.go 1262: Successfully claimed IPs: [192.168.110.195/26] block=192.168.110.192/26 handle="k8s-pod-network.35ca770c06698defa49f23e6f9d66382a18c6f83d1b53e641f7e69feaf045b81" host="srv-jtkau.gb1.brightbox.com" Oct 29 04:41:28.693793 env[1204]: 2025-10-29 04:41:28.613 [INFO][3595] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.110.195/26] handle="k8s-pod-network.35ca770c06698defa49f23e6f9d66382a18c6f83d1b53e641f7e69feaf045b81" host="srv-jtkau.gb1.brightbox.com" Oct 29 04:41:28.693793 env[1204]: 2025-10-29 04:41:28.614 [INFO][3595] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 29 04:41:28.693793 env[1204]: 2025-10-29 04:41:28.614 [INFO][3595] ipam/ipam_plugin.go 299: Calico CNI IPAM assigned addresses IPv4=[192.168.110.195/26] IPv6=[] ContainerID="35ca770c06698defa49f23e6f9d66382a18c6f83d1b53e641f7e69feaf045b81" HandleID="k8s-pod-network.35ca770c06698defa49f23e6f9d66382a18c6f83d1b53e641f7e69feaf045b81" Workload="srv--jtkau.gb1.brightbox.com-k8s-goldmane--666569f655--w7zrh-eth0" Oct 29 04:41:28.695288 env[1204]: 2025-10-29 04:41:28.619 [INFO][3550] cni-plugin/k8s.go 418: Populated endpoint ContainerID="35ca770c06698defa49f23e6f9d66382a18c6f83d1b53e641f7e69feaf045b81" Namespace="calico-system" Pod="goldmane-666569f655-w7zrh" WorkloadEndpoint="srv--jtkau.gb1.brightbox.com-k8s-goldmane--666569f655--w7zrh-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--jtkau.gb1.brightbox.com-k8s-goldmane--666569f655--w7zrh-eth0", GenerateName:"goldmane-666569f655-", Namespace:"calico-system", SelfLink:"", UID:"4809fb25-1663-4bc2-b12f-599470e2bb91", ResourceVersion:"944", Generation:0, CreationTimestamp:time.Date(2025, time.October, 29, 4, 40, 51, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"666569f655", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-jtkau.gb1.brightbox.com", ContainerID:"", Pod:"goldmane-666569f655-w7zrh", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.110.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"calid5c4aabe7be", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 29 04:41:28.695288 env[1204]: 2025-10-29 04:41:28.619 [INFO][3550] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.110.195/32] ContainerID="35ca770c06698defa49f23e6f9d66382a18c6f83d1b53e641f7e69feaf045b81" Namespace="calico-system" Pod="goldmane-666569f655-w7zrh" WorkloadEndpoint="srv--jtkau.gb1.brightbox.com-k8s-goldmane--666569f655--w7zrh-eth0" Oct 29 04:41:28.695288 env[1204]: 2025-10-29 04:41:28.619 [INFO][3550] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calid5c4aabe7be ContainerID="35ca770c06698defa49f23e6f9d66382a18c6f83d1b53e641f7e69feaf045b81" Namespace="calico-system" Pod="goldmane-666569f655-w7zrh" WorkloadEndpoint="srv--jtkau.gb1.brightbox.com-k8s-goldmane--666569f655--w7zrh-eth0" Oct 29 04:41:28.695288 env[1204]: 2025-10-29 04:41:28.647 [INFO][3550] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="35ca770c06698defa49f23e6f9d66382a18c6f83d1b53e641f7e69feaf045b81" Namespace="calico-system" Pod="goldmane-666569f655-w7zrh" WorkloadEndpoint="srv--jtkau.gb1.brightbox.com-k8s-goldmane--666569f655--w7zrh-eth0" Oct 29 04:41:28.695288 env[1204]: 2025-10-29 04:41:28.647 [INFO][3550] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="35ca770c06698defa49f23e6f9d66382a18c6f83d1b53e641f7e69feaf045b81" Namespace="calico-system" Pod="goldmane-666569f655-w7zrh" WorkloadEndpoint="srv--jtkau.gb1.brightbox.com-k8s-goldmane--666569f655--w7zrh-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--jtkau.gb1.brightbox.com-k8s-goldmane--666569f655--w7zrh-eth0", GenerateName:"goldmane-666569f655-", Namespace:"calico-system", SelfLink:"", UID:"4809fb25-1663-4bc2-b12f-599470e2bb91", ResourceVersion:"944", Generation:0, CreationTimestamp:time.Date(2025, time.October, 29, 4, 40, 51, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"666569f655", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-jtkau.gb1.brightbox.com", ContainerID:"35ca770c06698defa49f23e6f9d66382a18c6f83d1b53e641f7e69feaf045b81", Pod:"goldmane-666569f655-w7zrh", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.110.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"calid5c4aabe7be", MAC:"ea:06:40:d7:ac:9b", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 29 04:41:28.695288 env[1204]: 2025-10-29 04:41:28.684 [INFO][3550] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="35ca770c06698defa49f23e6f9d66382a18c6f83d1b53e641f7e69feaf045b81" Namespace="calico-system" Pod="goldmane-666569f655-w7zrh" WorkloadEndpoint="srv--jtkau.gb1.brightbox.com-k8s-goldmane--666569f655--w7zrh-eth0" Oct 29 04:41:28.704262 systemd-networkd[1018]: cali680f84ab990: Gained IPv6LL Oct 29 04:41:28.742000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:28.742000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:28.742000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:28.742000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:28.742000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:28.742000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:28.742000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:28.742000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:28.742000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:28.743000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:28.743000 audit: BPF prog-id=143 op=LOAD Oct 29 04:41:28.744000 audit[3621]: AVC avc: denied { bpf } for pid=3621 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:28.744000 audit[3621]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=3605 pid=3621 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:28.744000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337653535613438623663633865313566353334643434353066656230 Oct 29 04:41:28.745000 audit[3621]: AVC avc: denied { perfmon } for pid=3621 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:28.745000 audit[3621]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=3605 pid=3621 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:28.745000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337653535613438623663633865313566353334643434353066656230 Oct 29 04:41:28.745000 audit[3621]: AVC avc: denied { bpf } for pid=3621 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:28.745000 audit[3621]: AVC avc: denied { bpf } for pid=3621 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:28.745000 audit[3621]: AVC avc: denied { bpf } for pid=3621 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:28.745000 audit[3621]: AVC avc: denied { perfmon } for pid=3621 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:28.745000 audit[3621]: AVC avc: denied { perfmon } for pid=3621 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:28.745000 audit[3621]: AVC avc: denied { perfmon } for pid=3621 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:28.745000 audit[3621]: AVC avc: denied { perfmon } for pid=3621 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:28.745000 audit[3621]: AVC avc: denied { perfmon } for pid=3621 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:28.745000 audit[3621]: AVC avc: denied { bpf } for pid=3621 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:28.745000 audit[3621]: AVC avc: denied { bpf } for pid=3621 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:28.745000 audit: BPF prog-id=144 op=LOAD Oct 29 04:41:28.745000 audit[3621]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000344880 items=0 ppid=3605 pid=3621 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:28.745000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337653535613438623663633865313566353334643434353066656230 Oct 29 04:41:28.745000 audit[3621]: AVC avc: denied { bpf } for pid=3621 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:28.745000 audit[3621]: AVC avc: denied { bpf } for pid=3621 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:28.745000 audit[3621]: AVC avc: denied { perfmon } for pid=3621 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:28.745000 audit[3621]: AVC avc: denied { perfmon } for pid=3621 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:28.745000 audit[3621]: AVC avc: denied { perfmon } for pid=3621 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:28.745000 audit[3621]: AVC avc: denied { perfmon } for pid=3621 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:28.745000 audit[3621]: AVC avc: denied { perfmon } for pid=3621 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:28.745000 audit[3621]: AVC avc: denied { bpf } for pid=3621 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:28.745000 audit[3621]: AVC avc: denied { bpf } for pid=3621 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:28.745000 audit: BPF prog-id=145 op=LOAD Oct 29 04:41:28.745000 audit[3621]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0003448c8 items=0 ppid=3605 pid=3621 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:28.745000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337653535613438623663633865313566353334643434353066656230 Oct 29 04:41:28.745000 audit: BPF prog-id=145 op=UNLOAD Oct 29 04:41:28.745000 audit: BPF prog-id=144 op=UNLOAD Oct 29 04:41:28.745000 audit[3621]: AVC avc: denied { bpf } for pid=3621 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:28.745000 audit[3621]: AVC avc: denied { bpf } for pid=3621 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:28.745000 audit[3621]: AVC avc: denied { bpf } for pid=3621 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:28.745000 audit[3621]: AVC avc: denied { perfmon } for pid=3621 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:28.745000 audit[3621]: AVC avc: denied { perfmon } for pid=3621 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:28.745000 audit[3621]: AVC avc: denied { perfmon } for pid=3621 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:28.745000 audit[3621]: AVC avc: denied { perfmon } for pid=3621 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:28.745000 audit[3621]: AVC avc: denied { perfmon } for pid=3621 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:28.745000 audit[3621]: AVC avc: denied { bpf } for pid=3621 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:28.745000 audit[3621]: AVC avc: denied { bpf } for pid=3621 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:28.745000 audit: BPF prog-id=146 op=LOAD Oct 29 04:41:28.745000 audit[3621]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000344cd8 items=0 ppid=3605 pid=3621 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:28.745000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337653535613438623663633865313566353334643434353066656230 Oct 29 04:41:28.770476 env[1204]: time="2025-10-29T04:41:28.767552185Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 29 04:41:28.771209 env[1204]: time="2025-10-29T04:41:28.771150452Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 29 04:41:28.771394 env[1204]: time="2025-10-29T04:41:28.771351586Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 29 04:41:28.771936 env[1204]: time="2025-10-29T04:41:28.771807201Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/35ca770c06698defa49f23e6f9d66382a18c6f83d1b53e641f7e69feaf045b81 pid=3666 runtime=io.containerd.runc.v2 Oct 29 04:41:28.785806 kubelet[1975]: E1029 04:41:28.785633 1975 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-d8hbp" podUID="78135185-6b36-431d-89d1-d452e0f3a516" Oct 29 04:41:28.847389 systemd-networkd[1018]: cali501e1a249b6: Link UP Oct 29 04:41:28.848634 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali501e1a249b6: link becomes ready Oct 29 04:41:28.849797 systemd-networkd[1018]: cali501e1a249b6: Gained carrier Oct 29 04:41:28.865680 systemd[1]: Started cri-containerd-35ca770c06698defa49f23e6f9d66382a18c6f83d1b53e641f7e69feaf045b81.scope. Oct 29 04:41:28.890757 env[1204]: 2025-10-29 04:41:28.197 [INFO][3568] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist Oct 29 04:41:28.890757 env[1204]: 2025-10-29 04:41:28.245 [INFO][3568] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {srv--jtkau.gb1.brightbox.com-k8s-calico--kube--controllers--76dd6544c7--psclk-eth0 calico-kube-controllers-76dd6544c7- calico-system 7c4e2a15-2feb-448f-b8ed-a786076858ec 946 0 2025-10-29 04:40:54 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:76dd6544c7 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s srv-jtkau.gb1.brightbox.com calico-kube-controllers-76dd6544c7-psclk eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali501e1a249b6 [] [] }} ContainerID="1ac0699e632e086e618dc86f6cc81e6697e58db0525bb6141a9eae7887a999ff" Namespace="calico-system" Pod="calico-kube-controllers-76dd6544c7-psclk" WorkloadEndpoint="srv--jtkau.gb1.brightbox.com-k8s-calico--kube--controllers--76dd6544c7--psclk-" Oct 29 04:41:28.890757 env[1204]: 2025-10-29 04:41:28.245 [INFO][3568] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="1ac0699e632e086e618dc86f6cc81e6697e58db0525bb6141a9eae7887a999ff" Namespace="calico-system" Pod="calico-kube-controllers-76dd6544c7-psclk" WorkloadEndpoint="srv--jtkau.gb1.brightbox.com-k8s-calico--kube--controllers--76dd6544c7--psclk-eth0" Oct 29 04:41:28.890757 env[1204]: 2025-10-29 04:41:28.494 [INFO][3603] ipam/ipam_plugin.go 227: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="1ac0699e632e086e618dc86f6cc81e6697e58db0525bb6141a9eae7887a999ff" HandleID="k8s-pod-network.1ac0699e632e086e618dc86f6cc81e6697e58db0525bb6141a9eae7887a999ff" Workload="srv--jtkau.gb1.brightbox.com-k8s-calico--kube--controllers--76dd6544c7--psclk-eth0" Oct 29 04:41:28.890757 env[1204]: 2025-10-29 04:41:28.503 [INFO][3603] ipam/ipam_plugin.go 275: Auto assigning IP ContainerID="1ac0699e632e086e618dc86f6cc81e6697e58db0525bb6141a9eae7887a999ff" HandleID="k8s-pod-network.1ac0699e632e086e618dc86f6cc81e6697e58db0525bb6141a9eae7887a999ff" Workload="srv--jtkau.gb1.brightbox.com-k8s-calico--kube--controllers--76dd6544c7--psclk-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000326e20), Attrs:map[string]string{"namespace":"calico-system", "node":"srv-jtkau.gb1.brightbox.com", "pod":"calico-kube-controllers-76dd6544c7-psclk", "timestamp":"2025-10-29 04:41:28.494473497 +0000 UTC"}, Hostname:"srv-jtkau.gb1.brightbox.com", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 29 04:41:28.890757 env[1204]: 2025-10-29 04:41:28.503 [INFO][3603] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 29 04:41:28.890757 env[1204]: 2025-10-29 04:41:28.613 [INFO][3603] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 29 04:41:28.890757 env[1204]: 2025-10-29 04:41:28.613 [INFO][3603] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'srv-jtkau.gb1.brightbox.com' Oct 29 04:41:28.890757 env[1204]: 2025-10-29 04:41:28.633 [INFO][3603] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.1ac0699e632e086e618dc86f6cc81e6697e58db0525bb6141a9eae7887a999ff" host="srv-jtkau.gb1.brightbox.com" Oct 29 04:41:28.890757 env[1204]: 2025-10-29 04:41:28.652 [INFO][3603] ipam/ipam.go 394: Looking up existing affinities for host host="srv-jtkau.gb1.brightbox.com" Oct 29 04:41:28.890757 env[1204]: 2025-10-29 04:41:28.693 [INFO][3603] ipam/ipam.go 511: Trying affinity for 192.168.110.192/26 host="srv-jtkau.gb1.brightbox.com" Oct 29 04:41:28.890757 env[1204]: 2025-10-29 04:41:28.736 [INFO][3603] ipam/ipam.go 158: Attempting to load block cidr=192.168.110.192/26 host="srv-jtkau.gb1.brightbox.com" Oct 29 04:41:28.890757 env[1204]: 2025-10-29 04:41:28.747 [INFO][3603] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.110.192/26 host="srv-jtkau.gb1.brightbox.com" Oct 29 04:41:28.890757 env[1204]: 2025-10-29 04:41:28.747 [INFO][3603] ipam/ipam.go 1219: Attempting to assign 1 addresses from block block=192.168.110.192/26 handle="k8s-pod-network.1ac0699e632e086e618dc86f6cc81e6697e58db0525bb6141a9eae7887a999ff" host="srv-jtkau.gb1.brightbox.com" Oct 29 04:41:28.890757 env[1204]: 2025-10-29 04:41:28.752 [INFO][3603] ipam/ipam.go 1780: Creating new handle: k8s-pod-network.1ac0699e632e086e618dc86f6cc81e6697e58db0525bb6141a9eae7887a999ff Oct 29 04:41:28.890757 env[1204]: 2025-10-29 04:41:28.762 [INFO][3603] ipam/ipam.go 1246: Writing block in order to claim IPs block=192.168.110.192/26 handle="k8s-pod-network.1ac0699e632e086e618dc86f6cc81e6697e58db0525bb6141a9eae7887a999ff" host="srv-jtkau.gb1.brightbox.com" Oct 29 04:41:28.890757 env[1204]: 2025-10-29 04:41:28.777 [INFO][3603] ipam/ipam.go 1262: Successfully claimed IPs: [192.168.110.196/26] block=192.168.110.192/26 handle="k8s-pod-network.1ac0699e632e086e618dc86f6cc81e6697e58db0525bb6141a9eae7887a999ff" host="srv-jtkau.gb1.brightbox.com" Oct 29 04:41:28.890757 env[1204]: 2025-10-29 04:41:28.777 [INFO][3603] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.110.196/26] handle="k8s-pod-network.1ac0699e632e086e618dc86f6cc81e6697e58db0525bb6141a9eae7887a999ff" host="srv-jtkau.gb1.brightbox.com" Oct 29 04:41:28.890757 env[1204]: 2025-10-29 04:41:28.777 [INFO][3603] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 29 04:41:28.890757 env[1204]: 2025-10-29 04:41:28.778 [INFO][3603] ipam/ipam_plugin.go 299: Calico CNI IPAM assigned addresses IPv4=[192.168.110.196/26] IPv6=[] ContainerID="1ac0699e632e086e618dc86f6cc81e6697e58db0525bb6141a9eae7887a999ff" HandleID="k8s-pod-network.1ac0699e632e086e618dc86f6cc81e6697e58db0525bb6141a9eae7887a999ff" Workload="srv--jtkau.gb1.brightbox.com-k8s-calico--kube--controllers--76dd6544c7--psclk-eth0" Oct 29 04:41:28.892187 env[1204]: 2025-10-29 04:41:28.799 [INFO][3568] cni-plugin/k8s.go 418: Populated endpoint ContainerID="1ac0699e632e086e618dc86f6cc81e6697e58db0525bb6141a9eae7887a999ff" Namespace="calico-system" Pod="calico-kube-controllers-76dd6544c7-psclk" WorkloadEndpoint="srv--jtkau.gb1.brightbox.com-k8s-calico--kube--controllers--76dd6544c7--psclk-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--jtkau.gb1.brightbox.com-k8s-calico--kube--controllers--76dd6544c7--psclk-eth0", GenerateName:"calico-kube-controllers-76dd6544c7-", Namespace:"calico-system", SelfLink:"", UID:"7c4e2a15-2feb-448f-b8ed-a786076858ec", ResourceVersion:"946", Generation:0, CreationTimestamp:time.Date(2025, time.October, 29, 4, 40, 54, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"76dd6544c7", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-jtkau.gb1.brightbox.com", ContainerID:"", Pod:"calico-kube-controllers-76dd6544c7-psclk", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.110.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali501e1a249b6", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 29 04:41:28.892187 env[1204]: 2025-10-29 04:41:28.799 [INFO][3568] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.110.196/32] ContainerID="1ac0699e632e086e618dc86f6cc81e6697e58db0525bb6141a9eae7887a999ff" Namespace="calico-system" Pod="calico-kube-controllers-76dd6544c7-psclk" WorkloadEndpoint="srv--jtkau.gb1.brightbox.com-k8s-calico--kube--controllers--76dd6544c7--psclk-eth0" Oct 29 04:41:28.892187 env[1204]: 2025-10-29 04:41:28.799 [INFO][3568] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali501e1a249b6 ContainerID="1ac0699e632e086e618dc86f6cc81e6697e58db0525bb6141a9eae7887a999ff" Namespace="calico-system" Pod="calico-kube-controllers-76dd6544c7-psclk" WorkloadEndpoint="srv--jtkau.gb1.brightbox.com-k8s-calico--kube--controllers--76dd6544c7--psclk-eth0" Oct 29 04:41:28.892187 env[1204]: 2025-10-29 04:41:28.851 [INFO][3568] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="1ac0699e632e086e618dc86f6cc81e6697e58db0525bb6141a9eae7887a999ff" Namespace="calico-system" Pod="calico-kube-controllers-76dd6544c7-psclk" WorkloadEndpoint="srv--jtkau.gb1.brightbox.com-k8s-calico--kube--controllers--76dd6544c7--psclk-eth0" Oct 29 04:41:28.892187 env[1204]: 2025-10-29 04:41:28.852 [INFO][3568] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="1ac0699e632e086e618dc86f6cc81e6697e58db0525bb6141a9eae7887a999ff" Namespace="calico-system" Pod="calico-kube-controllers-76dd6544c7-psclk" WorkloadEndpoint="srv--jtkau.gb1.brightbox.com-k8s-calico--kube--controllers--76dd6544c7--psclk-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--jtkau.gb1.brightbox.com-k8s-calico--kube--controllers--76dd6544c7--psclk-eth0", GenerateName:"calico-kube-controllers-76dd6544c7-", Namespace:"calico-system", SelfLink:"", UID:"7c4e2a15-2feb-448f-b8ed-a786076858ec", ResourceVersion:"946", Generation:0, CreationTimestamp:time.Date(2025, time.October, 29, 4, 40, 54, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"76dd6544c7", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-jtkau.gb1.brightbox.com", ContainerID:"1ac0699e632e086e618dc86f6cc81e6697e58db0525bb6141a9eae7887a999ff", Pod:"calico-kube-controllers-76dd6544c7-psclk", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.110.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali501e1a249b6", MAC:"52:55:6b:e8:88:5a", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 29 04:41:28.892187 env[1204]: 2025-10-29 04:41:28.884 [INFO][3568] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="1ac0699e632e086e618dc86f6cc81e6697e58db0525bb6141a9eae7887a999ff" Namespace="calico-system" Pod="calico-kube-controllers-76dd6544c7-psclk" WorkloadEndpoint="srv--jtkau.gb1.brightbox.com-k8s-calico--kube--controllers--76dd6544c7--psclk-eth0" Oct 29 04:41:28.932726 env[1204]: time="2025-10-29T04:41:28.931039074Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 29 04:41:28.932726 env[1204]: time="2025-10-29T04:41:28.931111011Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 29 04:41:28.932726 env[1204]: time="2025-10-29T04:41:28.931127888Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 29 04:41:28.936897 env[1204]: time="2025-10-29T04:41:28.936681024Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1ac0699e632e086e618dc86f6cc81e6697e58db0525bb6141a9eae7887a999ff pid=3702 runtime=io.containerd.runc.v2 Oct 29 04:41:28.980771 systemd-networkd[1018]: cali3adb2a352a9: Link UP Oct 29 04:41:28.985270 systemd-networkd[1018]: cali3adb2a352a9: Gained carrier Oct 29 04:41:28.985671 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali3adb2a352a9: link becomes ready Oct 29 04:41:29.003033 systemd[1]: Started cri-containerd-1ac0699e632e086e618dc86f6cc81e6697e58db0525bb6141a9eae7887a999ff.scope. Oct 29 04:41:29.029236 env[1204]: 2025-10-29 04:41:28.248 [INFO][3569] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist Oct 29 04:41:29.029236 env[1204]: 2025-10-29 04:41:28.307 [INFO][3569] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {srv--jtkau.gb1.brightbox.com-k8s-coredns--668d6bf9bc--gdp2b-eth0 coredns-668d6bf9bc- kube-system 34882139-256c-45b8-b83c-22ae2a3a6d10 945 0 2025-10-29 04:40:34 +0000 UTC map[k8s-app:kube-dns pod-template-hash:668d6bf9bc projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s srv-jtkau.gb1.brightbox.com coredns-668d6bf9bc-gdp2b eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali3adb2a352a9 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] [] }} ContainerID="9028969ee66f77994fc660c40a7c4db9013f760ffa320f2f350dfe2b691cefdc" Namespace="kube-system" Pod="coredns-668d6bf9bc-gdp2b" WorkloadEndpoint="srv--jtkau.gb1.brightbox.com-k8s-coredns--668d6bf9bc--gdp2b-" Oct 29 04:41:29.029236 env[1204]: 2025-10-29 04:41:28.307 [INFO][3569] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="9028969ee66f77994fc660c40a7c4db9013f760ffa320f2f350dfe2b691cefdc" Namespace="kube-system" Pod="coredns-668d6bf9bc-gdp2b" WorkloadEndpoint="srv--jtkau.gb1.brightbox.com-k8s-coredns--668d6bf9bc--gdp2b-eth0" Oct 29 04:41:29.029236 env[1204]: 2025-10-29 04:41:28.582 [INFO][3620] ipam/ipam_plugin.go 227: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="9028969ee66f77994fc660c40a7c4db9013f760ffa320f2f350dfe2b691cefdc" HandleID="k8s-pod-network.9028969ee66f77994fc660c40a7c4db9013f760ffa320f2f350dfe2b691cefdc" Workload="srv--jtkau.gb1.brightbox.com-k8s-coredns--668d6bf9bc--gdp2b-eth0" Oct 29 04:41:29.029236 env[1204]: 2025-10-29 04:41:28.583 [INFO][3620] ipam/ipam_plugin.go 275: Auto assigning IP ContainerID="9028969ee66f77994fc660c40a7c4db9013f760ffa320f2f350dfe2b691cefdc" HandleID="k8s-pod-network.9028969ee66f77994fc660c40a7c4db9013f760ffa320f2f350dfe2b691cefdc" Workload="srv--jtkau.gb1.brightbox.com-k8s-coredns--668d6bf9bc--gdp2b-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002b6420), Attrs:map[string]string{"namespace":"kube-system", "node":"srv-jtkau.gb1.brightbox.com", "pod":"coredns-668d6bf9bc-gdp2b", "timestamp":"2025-10-29 04:41:28.582753684 +0000 UTC"}, Hostname:"srv-jtkau.gb1.brightbox.com", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 29 04:41:29.029236 env[1204]: 2025-10-29 04:41:28.583 [INFO][3620] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 29 04:41:29.029236 env[1204]: 2025-10-29 04:41:28.777 [INFO][3620] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 29 04:41:29.029236 env[1204]: 2025-10-29 04:41:28.777 [INFO][3620] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'srv-jtkau.gb1.brightbox.com' Oct 29 04:41:29.029236 env[1204]: 2025-10-29 04:41:28.829 [INFO][3620] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.9028969ee66f77994fc660c40a7c4db9013f760ffa320f2f350dfe2b691cefdc" host="srv-jtkau.gb1.brightbox.com" Oct 29 04:41:29.029236 env[1204]: 2025-10-29 04:41:28.873 [INFO][3620] ipam/ipam.go 394: Looking up existing affinities for host host="srv-jtkau.gb1.brightbox.com" Oct 29 04:41:29.029236 env[1204]: 2025-10-29 04:41:28.898 [INFO][3620] ipam/ipam.go 511: Trying affinity for 192.168.110.192/26 host="srv-jtkau.gb1.brightbox.com" Oct 29 04:41:29.029236 env[1204]: 2025-10-29 04:41:28.905 [INFO][3620] ipam/ipam.go 158: Attempting to load block cidr=192.168.110.192/26 host="srv-jtkau.gb1.brightbox.com" Oct 29 04:41:29.029236 env[1204]: 2025-10-29 04:41:28.910 [INFO][3620] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.110.192/26 host="srv-jtkau.gb1.brightbox.com" Oct 29 04:41:29.029236 env[1204]: 2025-10-29 04:41:28.910 [INFO][3620] ipam/ipam.go 1219: Attempting to assign 1 addresses from block block=192.168.110.192/26 handle="k8s-pod-network.9028969ee66f77994fc660c40a7c4db9013f760ffa320f2f350dfe2b691cefdc" host="srv-jtkau.gb1.brightbox.com" Oct 29 04:41:29.029236 env[1204]: 2025-10-29 04:41:28.923 [INFO][3620] ipam/ipam.go 1780: Creating new handle: k8s-pod-network.9028969ee66f77994fc660c40a7c4db9013f760ffa320f2f350dfe2b691cefdc Oct 29 04:41:29.029236 env[1204]: 2025-10-29 04:41:28.936 [INFO][3620] ipam/ipam.go 1246: Writing block in order to claim IPs block=192.168.110.192/26 handle="k8s-pod-network.9028969ee66f77994fc660c40a7c4db9013f760ffa320f2f350dfe2b691cefdc" host="srv-jtkau.gb1.brightbox.com" Oct 29 04:41:29.029236 env[1204]: 2025-10-29 04:41:28.950 [INFO][3620] ipam/ipam.go 1262: Successfully claimed IPs: [192.168.110.197/26] block=192.168.110.192/26 handle="k8s-pod-network.9028969ee66f77994fc660c40a7c4db9013f760ffa320f2f350dfe2b691cefdc" host="srv-jtkau.gb1.brightbox.com" Oct 29 04:41:29.029236 env[1204]: 2025-10-29 04:41:28.950 [INFO][3620] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.110.197/26] handle="k8s-pod-network.9028969ee66f77994fc660c40a7c4db9013f760ffa320f2f350dfe2b691cefdc" host="srv-jtkau.gb1.brightbox.com" Oct 29 04:41:29.029236 env[1204]: 2025-10-29 04:41:28.950 [INFO][3620] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 29 04:41:29.029236 env[1204]: 2025-10-29 04:41:28.950 [INFO][3620] ipam/ipam_plugin.go 299: Calico CNI IPAM assigned addresses IPv4=[192.168.110.197/26] IPv6=[] ContainerID="9028969ee66f77994fc660c40a7c4db9013f760ffa320f2f350dfe2b691cefdc" HandleID="k8s-pod-network.9028969ee66f77994fc660c40a7c4db9013f760ffa320f2f350dfe2b691cefdc" Workload="srv--jtkau.gb1.brightbox.com-k8s-coredns--668d6bf9bc--gdp2b-eth0" Oct 29 04:41:29.031137 env[1204]: 2025-10-29 04:41:28.960 [INFO][3569] cni-plugin/k8s.go 418: Populated endpoint ContainerID="9028969ee66f77994fc660c40a7c4db9013f760ffa320f2f350dfe2b691cefdc" Namespace="kube-system" Pod="coredns-668d6bf9bc-gdp2b" WorkloadEndpoint="srv--jtkau.gb1.brightbox.com-k8s-coredns--668d6bf9bc--gdp2b-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--jtkau.gb1.brightbox.com-k8s-coredns--668d6bf9bc--gdp2b-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"34882139-256c-45b8-b83c-22ae2a3a6d10", ResourceVersion:"945", Generation:0, CreationTimestamp:time.Date(2025, time.October, 29, 4, 40, 34, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-jtkau.gb1.brightbox.com", ContainerID:"", Pod:"coredns-668d6bf9bc-gdp2b", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.110.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali3adb2a352a9", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 29 04:41:29.031137 env[1204]: 2025-10-29 04:41:28.960 [INFO][3569] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.110.197/32] ContainerID="9028969ee66f77994fc660c40a7c4db9013f760ffa320f2f350dfe2b691cefdc" Namespace="kube-system" Pod="coredns-668d6bf9bc-gdp2b" WorkloadEndpoint="srv--jtkau.gb1.brightbox.com-k8s-coredns--668d6bf9bc--gdp2b-eth0" Oct 29 04:41:29.031137 env[1204]: 2025-10-29 04:41:28.960 [INFO][3569] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali3adb2a352a9 ContainerID="9028969ee66f77994fc660c40a7c4db9013f760ffa320f2f350dfe2b691cefdc" Namespace="kube-system" Pod="coredns-668d6bf9bc-gdp2b" WorkloadEndpoint="srv--jtkau.gb1.brightbox.com-k8s-coredns--668d6bf9bc--gdp2b-eth0" Oct 29 04:41:29.031137 env[1204]: 2025-10-29 04:41:28.987 [INFO][3569] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="9028969ee66f77994fc660c40a7c4db9013f760ffa320f2f350dfe2b691cefdc" Namespace="kube-system" Pod="coredns-668d6bf9bc-gdp2b" WorkloadEndpoint="srv--jtkau.gb1.brightbox.com-k8s-coredns--668d6bf9bc--gdp2b-eth0" Oct 29 04:41:29.031137 env[1204]: 2025-10-29 04:41:28.991 [INFO][3569] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="9028969ee66f77994fc660c40a7c4db9013f760ffa320f2f350dfe2b691cefdc" Namespace="kube-system" Pod="coredns-668d6bf9bc-gdp2b" WorkloadEndpoint="srv--jtkau.gb1.brightbox.com-k8s-coredns--668d6bf9bc--gdp2b-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--jtkau.gb1.brightbox.com-k8s-coredns--668d6bf9bc--gdp2b-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"34882139-256c-45b8-b83c-22ae2a3a6d10", ResourceVersion:"945", Generation:0, CreationTimestamp:time.Date(2025, time.October, 29, 4, 40, 34, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-jtkau.gb1.brightbox.com", ContainerID:"9028969ee66f77994fc660c40a7c4db9013f760ffa320f2f350dfe2b691cefdc", Pod:"coredns-668d6bf9bc-gdp2b", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.110.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali3adb2a352a9", MAC:"72:f2:0c:b6:f3:52", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 29 04:41:29.031137 env[1204]: 2025-10-29 04:41:29.025 [INFO][3569] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="9028969ee66f77994fc660c40a7c4db9013f760ffa320f2f350dfe2b691cefdc" Namespace="kube-system" Pod="coredns-668d6bf9bc-gdp2b" WorkloadEndpoint="srv--jtkau.gb1.brightbox.com-k8s-coredns--668d6bf9bc--gdp2b-eth0" Oct 29 04:41:29.050820 env[1204]: time="2025-10-29T04:41:29.050406477Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 29 04:41:29.050820 env[1204]: time="2025-10-29T04:41:29.050479890Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 29 04:41:29.050820 env[1204]: time="2025-10-29T04:41:29.050497339Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 29 04:41:29.051155 env[1204]: time="2025-10-29T04:41:29.050864823Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/9028969ee66f77994fc660c40a7c4db9013f760ffa320f2f350dfe2b691cefdc pid=3739 runtime=io.containerd.runc.v2 Oct 29 04:41:29.120623 systemd[1]: Started cri-containerd-9028969ee66f77994fc660c40a7c4db9013f760ffa320f2f350dfe2b691cefdc.scope. Oct 29 04:41:29.164970 env[1204]: time="2025-10-29T04:41:29.164909172Z" level=info msg="StopPodSandbox for \"0a766542938c9a629ef7c3f9b499f1b8c875a6f90bffcd4c7cfd1b1f50f55132\"" Oct 29 04:41:29.179403 env[1204]: time="2025-10-29T04:41:29.179283714Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-7fbcdbccd-mghcv,Uid:f101f74a-91c5-460d-8026-7c7655b6a631,Namespace:calico-system,Attempt:0,} returns sandbox id \"37e55a48b6cc8e15f534d4450feb08c67d6d6510e5fa6a81b8072abde705fd4e\"" Oct 29 04:41:29.182103 env[1204]: time="2025-10-29T04:41:29.182062155Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.4\"" Oct 29 04:41:29.197000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.197000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.197000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.197000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.197000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.197000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.197000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.197000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.197000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.197000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.197000 audit: BPF prog-id=147 op=LOAD Oct 29 04:41:29.204000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.204000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.204000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.204000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.204000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.204000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.204000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.204000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.204000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.204000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.204000 audit: BPF prog-id=148 op=LOAD Oct 29 04:41:29.209000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.209000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.209000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.209000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.209000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.209000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.209000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.209000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.209000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.209000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.209000 audit: BPF prog-id=149 op=LOAD Oct 29 04:41:29.213000 audit[3678]: AVC avc: denied { bpf } for pid=3678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.213000 audit[3678]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3666 pid=3678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:29.213000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335636137373063303636393864656661343966323365366639643636 Oct 29 04:41:29.215000 audit[3678]: AVC avc: denied { perfmon } for pid=3678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.215000 audit[3678]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3666 pid=3678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:29.215000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335636137373063303636393864656661343966323365366639643636 Oct 29 04:41:29.216000 audit[3678]: AVC avc: denied { bpf } for pid=3678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.216000 audit[3678]: AVC avc: denied { bpf } for pid=3678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.216000 audit[3711]: AVC avc: denied { bpf } for pid=3711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.217000 audit[3749]: AVC avc: denied { bpf } for pid=3749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.216000 audit[3678]: AVC avc: denied { bpf } for pid=3678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.216000 audit[3678]: AVC avc: denied { perfmon } for pid=3678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.216000 audit[3678]: AVC avc: denied { perfmon } for pid=3678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.216000 audit[3678]: AVC avc: denied { perfmon } for pid=3678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.216000 audit[3678]: AVC avc: denied { perfmon } for pid=3678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.216000 audit[3678]: AVC avc: denied { perfmon } for pid=3678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.216000 audit[3678]: AVC avc: denied { bpf } for pid=3678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.217000 audit[3749]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000119c48 a2=10 a3=1c items=0 ppid=3739 pid=3749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:29.216000 audit[3711]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3702 pid=3711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:29.217000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930323839363965653636663737393934666336363063343061376334 Oct 29 04:41:29.216000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161633036393965363332653038366536313864633836663663633831 Oct 29 04:41:29.219000 audit[3749]: AVC avc: denied { perfmon } for pid=3749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.219000 audit[3711]: AVC avc: denied { perfmon } for pid=3711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.216000 audit[3678]: AVC avc: denied { bpf } for pid=3678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.216000 audit: BPF prog-id=150 op=LOAD Oct 29 04:41:29.219000 audit[3711]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3702 pid=3711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:29.219000 audit[3749]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001196b0 a2=3c a3=c items=0 ppid=3739 pid=3749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:29.219000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161633036393965363332653038366536313864633836663663633831 Oct 29 04:41:29.219000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930323839363965653636663737393934666336363063343061376334 Oct 29 04:41:29.219000 audit[3711]: AVC avc: denied { bpf } for pid=3711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.219000 audit[3711]: AVC avc: denied { bpf } for pid=3711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.219000 audit[3749]: AVC avc: denied { bpf } for pid=3749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.219000 audit[3749]: AVC avc: denied { bpf } for pid=3749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.219000 audit[3711]: AVC avc: denied { bpf } for pid=3711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.219000 audit[3711]: AVC avc: denied { perfmon } for pid=3711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.219000 audit[3711]: AVC avc: denied { perfmon } for pid=3711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.219000 audit[3711]: AVC avc: denied { perfmon } for pid=3711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.219000 audit[3711]: AVC avc: denied { perfmon } for pid=3711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.219000 audit[3711]: AVC avc: denied { perfmon } for pid=3711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.219000 audit[3711]: AVC avc: denied { bpf } for pid=3711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.219000 audit[3749]: AVC avc: denied { bpf } for pid=3749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.219000 audit[3749]: AVC avc: denied { perfmon } for pid=3749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.219000 audit[3749]: AVC avc: denied { perfmon } for pid=3749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.219000 audit[3749]: AVC avc: denied { perfmon } for pid=3749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.219000 audit[3749]: AVC avc: denied { perfmon } for pid=3749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.219000 audit[3749]: AVC avc: denied { perfmon } for pid=3749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.219000 audit[3749]: AVC avc: denied { bpf } for pid=3749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.216000 audit[3678]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000025020 items=0 ppid=3666 pid=3678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:29.219000 audit[3749]: AVC avc: denied { bpf } for pid=3749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.219000 audit: BPF prog-id=151 op=LOAD Oct 29 04:41:29.216000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335636137373063303636393864656661343966323365366639643636 Oct 29 04:41:29.222000 audit[3678]: AVC avc: denied { bpf } for pid=3678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.219000 audit[3711]: AVC avc: denied { bpf } for pid=3711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.219000 audit: BPF prog-id=152 op=LOAD Oct 29 04:41:29.219000 audit[3749]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001199d8 a2=78 a3=c000300ed0 items=0 ppid=3739 pid=3749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:29.219000 audit[3711]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003d6570 items=0 ppid=3702 pid=3711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:29.222000 audit[3678]: AVC avc: denied { bpf } for pid=3678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.222000 audit[3678]: AVC avc: denied { perfmon } for pid=3678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.222000 audit[3678]: AVC avc: denied { perfmon } for pid=3678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.222000 audit[3678]: AVC avc: denied { perfmon } for pid=3678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.222000 audit[3678]: AVC avc: denied { perfmon } for pid=3678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.222000 audit[3678]: AVC avc: denied { perfmon } for pid=3678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.222000 audit[3678]: AVC avc: denied { bpf } for pid=3678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.219000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930323839363965653636663737393934666336363063343061376334 Oct 29 04:41:29.219000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161633036393965363332653038366536313864633836663663633831 Oct 29 04:41:29.224000 audit[3711]: AVC avc: denied { bpf } for pid=3711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.224000 audit[3749]: AVC avc: denied { bpf } for pid=3749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.222000 audit[3678]: AVC avc: denied { bpf } for pid=3678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.222000 audit: BPF prog-id=153 op=LOAD Oct 29 04:41:29.224000 audit[3749]: AVC avc: denied { bpf } for pid=3749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.224000 audit[3749]: AVC avc: denied { perfmon } for pid=3749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.224000 audit[3749]: AVC avc: denied { perfmon } for pid=3749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.224000 audit[3749]: AVC avc: denied { perfmon } for pid=3749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.224000 audit[3749]: AVC avc: denied { perfmon } for pid=3749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.224000 audit[3749]: AVC avc: denied { perfmon } for pid=3749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.224000 audit[3749]: AVC avc: denied { bpf } for pid=3749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.224000 audit[3711]: AVC avc: denied { bpf } for pid=3711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.224000 audit[3711]: AVC avc: denied { perfmon } for pid=3711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.224000 audit[3711]: AVC avc: denied { perfmon } for pid=3711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.224000 audit[3711]: AVC avc: denied { perfmon } for pid=3711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.224000 audit[3711]: AVC avc: denied { perfmon } for pid=3711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.224000 audit[3711]: AVC avc: denied { perfmon } for pid=3711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.224000 audit[3711]: AVC avc: denied { bpf } for pid=3711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.222000 audit[3678]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000025068 items=0 ppid=3666 pid=3678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:29.222000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335636137373063303636393864656661343966323365366639643636 Oct 29 04:41:29.225000 audit: BPF prog-id=153 op=UNLOAD Oct 29 04:41:29.224000 audit[3749]: AVC avc: denied { bpf } for pid=3749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.224000 audit: BPF prog-id=154 op=LOAD Oct 29 04:41:29.226000 audit: BPF prog-id=150 op=UNLOAD Oct 29 04:41:29.224000 audit[3711]: AVC avc: denied { bpf } for pid=3711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.224000 audit: BPF prog-id=155 op=LOAD Oct 29 04:41:29.224000 audit[3749]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000119770 a2=78 a3=c000300f18 items=0 ppid=3739 pid=3749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:29.224000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930323839363965653636663737393934666336363063343061376334 Oct 29 04:41:29.232000 audit[3678]: AVC avc: denied { bpf } for pid=3678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.232000 audit[3678]: AVC avc: denied { bpf } for pid=3678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.224000 audit[3711]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003d65b8 items=0 ppid=3702 pid=3711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:29.232000 audit: BPF prog-id=154 op=UNLOAD Oct 29 04:41:29.224000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161633036393965363332653038366536313864633836663663633831 Oct 29 04:41:29.232000 audit: BPF prog-id=151 op=UNLOAD Oct 29 04:41:29.232000 audit: BPF prog-id=155 op=UNLOAD Oct 29 04:41:29.232000 audit: BPF prog-id=152 op=UNLOAD Oct 29 04:41:29.232000 audit[3749]: AVC avc: denied { bpf } for pid=3749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.232000 audit[3749]: AVC avc: denied { bpf } for pid=3749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.232000 audit[3678]: AVC avc: denied { bpf } for pid=3678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.232000 audit[3678]: AVC avc: denied { perfmon } for pid=3678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.232000 audit[3678]: AVC avc: denied { perfmon } for pid=3678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.232000 audit[3678]: AVC avc: denied { perfmon } for pid=3678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.232000 audit[3678]: AVC avc: denied { perfmon } for pid=3678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.232000 audit[3678]: AVC avc: denied { perfmon } for pid=3678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.232000 audit[3678]: AVC avc: denied { bpf } for pid=3678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.232000 audit[3711]: AVC avc: denied { bpf } for pid=3711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.232000 audit[3711]: AVC avc: denied { bpf } for pid=3711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.232000 audit[3678]: AVC avc: denied { bpf } for pid=3678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.232000 audit: BPF prog-id=156 op=LOAD Oct 29 04:41:29.232000 audit[3749]: AVC avc: denied { bpf } for pid=3749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.232000 audit[3749]: AVC avc: denied { perfmon } for pid=3749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.232000 audit[3749]: AVC avc: denied { perfmon } for pid=3749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.232000 audit[3749]: AVC avc: denied { perfmon } for pid=3749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.232000 audit[3749]: AVC avc: denied { perfmon } for pid=3749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.232000 audit[3749]: AVC avc: denied { perfmon } for pid=3749 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.232000 audit[3749]: AVC avc: denied { bpf } for pid=3749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.232000 audit[3749]: AVC avc: denied { bpf } for pid=3749 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.232000 audit: BPF prog-id=157 op=LOAD Oct 29 04:41:29.232000 audit[3711]: AVC avc: denied { bpf } for pid=3711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.232000 audit[3711]: AVC avc: denied { perfmon } for pid=3711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.232000 audit[3711]: AVC avc: denied { perfmon } for pid=3711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.232000 audit[3711]: AVC avc: denied { perfmon } for pid=3711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.232000 audit[3711]: AVC avc: denied { perfmon } for pid=3711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.232000 audit[3711]: AVC avc: denied { perfmon } for pid=3711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.232000 audit[3711]: AVC avc: denied { bpf } for pid=3711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.232000 audit[3711]: AVC avc: denied { bpf } for pid=3711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.232000 audit: BPF prog-id=158 op=LOAD Oct 29 04:41:29.232000 audit[3678]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000025478 items=0 ppid=3666 pid=3678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:29.232000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335636137373063303636393864656661343966323365366639643636 Oct 29 04:41:29.232000 audit[3749]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000119c30 a2=78 a3=c000301328 items=0 ppid=3739 pid=3749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:29.232000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930323839363965653636663737393934666336363063343061376334 Oct 29 04:41:29.232000 audit[3711]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003d69c8 items=0 ppid=3702 pid=3711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:29.232000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161633036393965363332653038366536313864633836663663633831 Oct 29 04:41:29.368999 env[1204]: time="2025-10-29T04:41:29.368589936Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-gdp2b,Uid:34882139-256c-45b8-b83c-22ae2a3a6d10,Namespace:kube-system,Attempt:1,} returns sandbox id \"9028969ee66f77994fc660c40a7c4db9013f760ffa320f2f350dfe2b691cefdc\"" Oct 29 04:41:29.377068 env[1204]: time="2025-10-29T04:41:29.374287663Z" level=info msg="CreateContainer within sandbox \"9028969ee66f77994fc660c40a7c4db9013f760ffa320f2f350dfe2b691cefdc\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Oct 29 04:41:29.401976 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3665775381.mount: Deactivated successfully. Oct 29 04:41:29.410745 env[1204]: time="2025-10-29T04:41:29.408453100Z" level=info msg="CreateContainer within sandbox \"9028969ee66f77994fc660c40a7c4db9013f760ffa320f2f350dfe2b691cefdc\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"5a79fd11af64d6200da6ae170bebe153d5239f7f1e59401b038eb87a8f9de25b\"" Oct 29 04:41:29.420634 env[1204]: time="2025-10-29T04:41:29.415906056Z" level=info msg="StartContainer for \"5a79fd11af64d6200da6ae170bebe153d5239f7f1e59401b038eb87a8f9de25b\"" Oct 29 04:41:29.493700 env[1204]: time="2025-10-29T04:41:29.493421503Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 29 04:41:29.501782 env[1204]: time="2025-10-29T04:41:29.500907142Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.4\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found" Oct 29 04:41:29.505136 kubelet[1975]: E1029 04:41:29.502985 1975 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.4\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found" image="ghcr.io/flatcar/calico/whisker:v3.30.4" Oct 29 04:41:29.505136 kubelet[1975]: E1029 04:41:29.503092 1975 kuberuntime_image.go:55] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.4\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found" image="ghcr.io/flatcar/calico/whisker:v3.30.4" Oct 29 04:41:29.505136 kubelet[1975]: E1029 04:41:29.503378 1975 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:whisker,Image:ghcr.io/flatcar/calico/whisker:v3.30.4,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:CALICO_VERSION,Value:v3.30.4,ValueFrom:nil,},EnvVar{Name:CLUSTER_ID,Value:97cf41431c4b47fe94ab130b9db85912,ValueFrom:nil,},EnvVar{Name:CLUSTER_TYPE,Value:typha,kdd,k8s,operator,bgp,kubeadm,ValueFrom:nil,},EnvVar{Name:NOTIFICATIONS,Value:Enabled,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kube-api-access-rq4tk,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-7fbcdbccd-mghcv_calico-system(f101f74a-91c5-460d-8026-7c7655b6a631): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.4\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found" logger="UnhandledError" Oct 29 04:41:29.513873 env[1204]: time="2025-10-29T04:41:29.508258480Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\"" Oct 29 04:41:29.512797 systemd[1]: Started cri-containerd-5a79fd11af64d6200da6ae170bebe153d5239f7f1e59401b038eb87a8f9de25b.scope. Oct 29 04:41:29.527644 env[1204]: time="2025-10-29T04:41:29.527505884Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-666569f655-w7zrh,Uid:4809fb25-1663-4bc2-b12f-599470e2bb91,Namespace:calico-system,Attempt:1,} returns sandbox id \"35ca770c06698defa49f23e6f9d66382a18c6f83d1b53e641f7e69feaf045b81\"" Oct 29 04:41:29.572810 env[1204]: time="2025-10-29T04:41:29.572498819Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-76dd6544c7-psclk,Uid:7c4e2a15-2feb-448f-b8ed-a786076858ec,Namespace:calico-system,Attempt:1,} returns sandbox id \"1ac0699e632e086e618dc86f6cc81e6697e58db0525bb6141a9eae7887a999ff\"" Oct 29 04:41:29.584000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.584000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.584000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.584000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.584000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.584000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.584000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.584000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.584000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.585000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.585000 audit: BPF prog-id=159 op=LOAD Oct 29 04:41:29.586000 audit[3850]: AVC avc: denied { bpf } for pid=3850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.586000 audit[3850]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3739 pid=3850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:29.586000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561373966643131616636346436323030646136616531373062656265 Oct 29 04:41:29.586000 audit[3850]: AVC avc: denied { perfmon } for pid=3850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.586000 audit[3850]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3739 pid=3850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:29.586000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561373966643131616636346436323030646136616531373062656265 Oct 29 04:41:29.586000 audit[3850]: AVC avc: denied { bpf } for pid=3850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.586000 audit[3850]: AVC avc: denied { bpf } for pid=3850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.586000 audit[3850]: AVC avc: denied { bpf } for pid=3850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.586000 audit[3850]: AVC avc: denied { perfmon } for pid=3850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.586000 audit[3850]: AVC avc: denied { perfmon } for pid=3850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.586000 audit[3850]: AVC avc: denied { perfmon } for pid=3850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.586000 audit[3850]: AVC avc: denied { perfmon } for pid=3850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.586000 audit[3850]: AVC avc: denied { perfmon } for pid=3850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.586000 audit[3850]: AVC avc: denied { bpf } for pid=3850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.586000 audit[3850]: AVC avc: denied { bpf } for pid=3850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.586000 audit: BPF prog-id=160 op=LOAD Oct 29 04:41:29.586000 audit[3850]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000212e50 items=0 ppid=3739 pid=3850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:29.586000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561373966643131616636346436323030646136616531373062656265 Oct 29 04:41:29.586000 audit[3850]: AVC avc: denied { bpf } for pid=3850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.586000 audit[3850]: AVC avc: denied { bpf } for pid=3850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.586000 audit[3850]: AVC avc: denied { perfmon } for pid=3850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.586000 audit[3850]: AVC avc: denied { perfmon } for pid=3850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.586000 audit[3850]: AVC avc: denied { perfmon } for pid=3850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.586000 audit[3850]: AVC avc: denied { perfmon } for pid=3850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.586000 audit[3850]: AVC avc: denied { perfmon } for pid=3850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.586000 audit[3850]: AVC avc: denied { bpf } for pid=3850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.586000 audit[3850]: AVC avc: denied { bpf } for pid=3850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.586000 audit: BPF prog-id=161 op=LOAD Oct 29 04:41:29.586000 audit[3850]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000212e98 items=0 ppid=3739 pid=3850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:29.586000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561373966643131616636346436323030646136616531373062656265 Oct 29 04:41:29.586000 audit: BPF prog-id=161 op=UNLOAD Oct 29 04:41:29.586000 audit: BPF prog-id=160 op=UNLOAD Oct 29 04:41:29.586000 audit[3850]: AVC avc: denied { bpf } for pid=3850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.586000 audit[3850]: AVC avc: denied { bpf } for pid=3850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.586000 audit[3850]: AVC avc: denied { bpf } for pid=3850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.586000 audit[3850]: AVC avc: denied { perfmon } for pid=3850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.586000 audit[3850]: AVC avc: denied { perfmon } for pid=3850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.586000 audit[3850]: AVC avc: denied { perfmon } for pid=3850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.586000 audit[3850]: AVC avc: denied { perfmon } for pid=3850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.586000 audit[3850]: AVC avc: denied { perfmon } for pid=3850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.586000 audit[3850]: AVC avc: denied { bpf } for pid=3850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.586000 audit[3850]: AVC avc: denied { bpf } for pid=3850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.586000 audit: BPF prog-id=162 op=LOAD Oct 29 04:41:29.586000 audit[3850]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0002132a8 items=0 ppid=3739 pid=3850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:29.586000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561373966643131616636346436323030646136616531373062656265 Oct 29 04:41:29.611534 env[1204]: 2025-10-29 04:41:29.381 [WARNING][3807] cni-plugin/k8s.go 598: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="0a766542938c9a629ef7c3f9b499f1b8c875a6f90bffcd4c7cfd1b1f50f55132" WorkloadEndpoint="srv--jtkau.gb1.brightbox.com-k8s-whisker--5bfb84f6--jwthd-eth0" Oct 29 04:41:29.611534 env[1204]: 2025-10-29 04:41:29.381 [INFO][3807] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="0a766542938c9a629ef7c3f9b499f1b8c875a6f90bffcd4c7cfd1b1f50f55132" Oct 29 04:41:29.611534 env[1204]: 2025-10-29 04:41:29.381 [INFO][3807] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="0a766542938c9a629ef7c3f9b499f1b8c875a6f90bffcd4c7cfd1b1f50f55132" iface="eth0" netns="" Oct 29 04:41:29.611534 env[1204]: 2025-10-29 04:41:29.381 [INFO][3807] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="0a766542938c9a629ef7c3f9b499f1b8c875a6f90bffcd4c7cfd1b1f50f55132" Oct 29 04:41:29.611534 env[1204]: 2025-10-29 04:41:29.381 [INFO][3807] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="0a766542938c9a629ef7c3f9b499f1b8c875a6f90bffcd4c7cfd1b1f50f55132" Oct 29 04:41:29.611534 env[1204]: 2025-10-29 04:41:29.560 [INFO][3828] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="0a766542938c9a629ef7c3f9b499f1b8c875a6f90bffcd4c7cfd1b1f50f55132" HandleID="k8s-pod-network.0a766542938c9a629ef7c3f9b499f1b8c875a6f90bffcd4c7cfd1b1f50f55132" Workload="srv--jtkau.gb1.brightbox.com-k8s-whisker--5bfb84f6--jwthd-eth0" Oct 29 04:41:29.611534 env[1204]: 2025-10-29 04:41:29.560 [INFO][3828] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 29 04:41:29.611534 env[1204]: 2025-10-29 04:41:29.561 [INFO][3828] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 29 04:41:29.611534 env[1204]: 2025-10-29 04:41:29.593 [WARNING][3828] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="0a766542938c9a629ef7c3f9b499f1b8c875a6f90bffcd4c7cfd1b1f50f55132" HandleID="k8s-pod-network.0a766542938c9a629ef7c3f9b499f1b8c875a6f90bffcd4c7cfd1b1f50f55132" Workload="srv--jtkau.gb1.brightbox.com-k8s-whisker--5bfb84f6--jwthd-eth0" Oct 29 04:41:29.611534 env[1204]: 2025-10-29 04:41:29.593 [INFO][3828] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="0a766542938c9a629ef7c3f9b499f1b8c875a6f90bffcd4c7cfd1b1f50f55132" HandleID="k8s-pod-network.0a766542938c9a629ef7c3f9b499f1b8c875a6f90bffcd4c7cfd1b1f50f55132" Workload="srv--jtkau.gb1.brightbox.com-k8s-whisker--5bfb84f6--jwthd-eth0" Oct 29 04:41:29.611534 env[1204]: 2025-10-29 04:41:29.602 [INFO][3828] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 29 04:41:29.611534 env[1204]: 2025-10-29 04:41:29.606 [INFO][3807] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="0a766542938c9a629ef7c3f9b499f1b8c875a6f90bffcd4c7cfd1b1f50f55132" Oct 29 04:41:29.612459 env[1204]: time="2025-10-29T04:41:29.611590316Z" level=info msg="TearDown network for sandbox \"0a766542938c9a629ef7c3f9b499f1b8c875a6f90bffcd4c7cfd1b1f50f55132\" successfully" Oct 29 04:41:29.612459 env[1204]: time="2025-10-29T04:41:29.611646766Z" level=info msg="StopPodSandbox for \"0a766542938c9a629ef7c3f9b499f1b8c875a6f90bffcd4c7cfd1b1f50f55132\" returns successfully" Oct 29 04:41:29.613913 env[1204]: time="2025-10-29T04:41:29.613870992Z" level=info msg="RemovePodSandbox for \"0a766542938c9a629ef7c3f9b499f1b8c875a6f90bffcd4c7cfd1b1f50f55132\"" Oct 29 04:41:29.614114 env[1204]: time="2025-10-29T04:41:29.613928340Z" level=info msg="Forcibly stopping sandbox \"0a766542938c9a629ef7c3f9b499f1b8c875a6f90bffcd4c7cfd1b1f50f55132\"" Oct 29 04:41:29.623000 audit[3893]: AVC avc: denied { bpf } for pid=3893 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.623000 audit[3893]: AVC avc: denied { bpf } for pid=3893 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.623000 audit[3893]: AVC avc: denied { perfmon } for pid=3893 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.623000 audit[3893]: AVC avc: denied { perfmon } for pid=3893 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.623000 audit[3893]: AVC avc: denied { perfmon } for pid=3893 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.623000 audit[3893]: AVC avc: denied { perfmon } for pid=3893 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.623000 audit[3893]: AVC avc: denied { perfmon } for pid=3893 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.623000 audit[3893]: AVC avc: denied { bpf } for pid=3893 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.623000 audit[3893]: AVC avc: denied { bpf } for pid=3893 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.623000 audit: BPF prog-id=163 op=LOAD Oct 29 04:41:29.623000 audit[3893]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff645bb690 a2=98 a3=1fffffffffffffff items=0 ppid=3392 pid=3893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:29.623000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Oct 29 04:41:29.623000 audit: BPF prog-id=163 op=UNLOAD Oct 29 04:41:29.625590 env[1204]: time="2025-10-29T04:41:29.625522522Z" level=info msg="StartContainer for \"5a79fd11af64d6200da6ae170bebe153d5239f7f1e59401b038eb87a8f9de25b\" returns successfully" Oct 29 04:41:29.626000 audit[3893]: AVC avc: denied { bpf } for pid=3893 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.626000 audit[3893]: AVC avc: denied { bpf } for pid=3893 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.626000 audit[3893]: AVC avc: denied { perfmon } for pid=3893 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.626000 audit[3893]: AVC avc: denied { perfmon } for pid=3893 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.626000 audit[3893]: AVC avc: denied { perfmon } for pid=3893 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.626000 audit[3893]: AVC avc: denied { perfmon } for pid=3893 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.626000 audit[3893]: AVC avc: denied { perfmon } for pid=3893 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.626000 audit[3893]: AVC avc: denied { bpf } for pid=3893 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.626000 audit[3893]: AVC avc: denied { bpf } for pid=3893 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.626000 audit: BPF prog-id=164 op=LOAD Oct 29 04:41:29.626000 audit[3893]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff645bb570 a2=94 a3=3 items=0 ppid=3392 pid=3893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:29.626000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Oct 29 04:41:29.627000 audit: BPF prog-id=164 op=UNLOAD Oct 29 04:41:29.627000 audit[3893]: AVC avc: denied { bpf } for pid=3893 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.627000 audit[3893]: AVC avc: denied { bpf } for pid=3893 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.627000 audit[3893]: AVC avc: denied { perfmon } for pid=3893 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.627000 audit[3893]: AVC avc: denied { perfmon } for pid=3893 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.627000 audit[3893]: AVC avc: denied { perfmon } for pid=3893 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.627000 audit[3893]: AVC avc: denied { perfmon } for pid=3893 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.627000 audit[3893]: AVC avc: denied { perfmon } for pid=3893 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.627000 audit[3893]: AVC avc: denied { bpf } for pid=3893 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.627000 audit[3893]: AVC avc: denied { bpf } for pid=3893 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.627000 audit: BPF prog-id=165 op=LOAD Oct 29 04:41:29.627000 audit[3893]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff645bb5b0 a2=94 a3=7fff645bb790 items=0 ppid=3392 pid=3893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:29.627000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Oct 29 04:41:29.629000 audit: BPF prog-id=165 op=UNLOAD Oct 29 04:41:29.629000 audit[3893]: AVC avc: denied { perfmon } for pid=3893 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.629000 audit[3893]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=0 a1=7fff645bb680 a2=50 a3=a000000085 items=0 ppid=3392 pid=3893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:29.629000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F74632F676C6F62616C732F63616C695F63746C625F70726F677300747970650070726F675F6172726179006B657900340076616C7565003400656E74726965730033006E616D650063616C695F63746C625F70726F677300666C6167730030 Oct 29 04:41:29.633000 audit[3898]: AVC avc: denied { bpf } for pid=3898 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.633000 audit[3898]: AVC avc: denied { bpf } for pid=3898 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.633000 audit[3898]: AVC avc: denied { perfmon } for pid=3898 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.633000 audit[3898]: AVC avc: denied { perfmon } for pid=3898 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.633000 audit[3898]: AVC avc: denied { perfmon } for pid=3898 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.633000 audit[3898]: AVC avc: denied { perfmon } for pid=3898 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.633000 audit[3898]: AVC avc: denied { perfmon } for pid=3898 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.633000 audit[3898]: AVC avc: denied { bpf } for pid=3898 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.633000 audit[3898]: AVC avc: denied { bpf } for pid=3898 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.633000 audit: BPF prog-id=166 op=LOAD Oct 29 04:41:29.633000 audit[3898]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffc7b45d80 a2=98 a3=3 items=0 ppid=3392 pid=3898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:29.633000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 29 04:41:29.642000 audit: BPF prog-id=166 op=UNLOAD Oct 29 04:41:29.643000 audit[3898]: AVC avc: denied { bpf } for pid=3898 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.643000 audit[3898]: AVC avc: denied { bpf } for pid=3898 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.643000 audit[3898]: AVC avc: denied { perfmon } for pid=3898 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.643000 audit[3898]: AVC avc: denied { perfmon } for pid=3898 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.643000 audit[3898]: AVC avc: denied { perfmon } for pid=3898 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.643000 audit[3898]: AVC avc: denied { perfmon } for pid=3898 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.643000 audit[3898]: AVC avc: denied { perfmon } for pid=3898 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.643000 audit[3898]: AVC avc: denied { bpf } for pid=3898 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.643000 audit[3898]: AVC avc: denied { bpf } for pid=3898 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.643000 audit: BPF prog-id=167 op=LOAD Oct 29 04:41:29.643000 audit[3898]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fffc7b45b70 a2=94 a3=54428f items=0 ppid=3392 pid=3898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:29.643000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 29 04:41:29.643000 audit: BPF prog-id=167 op=UNLOAD Oct 29 04:41:29.643000 audit[3898]: AVC avc: denied { bpf } for pid=3898 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.643000 audit[3898]: AVC avc: denied { bpf } for pid=3898 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.643000 audit[3898]: AVC avc: denied { perfmon } for pid=3898 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.643000 audit[3898]: AVC avc: denied { perfmon } for pid=3898 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.643000 audit[3898]: AVC avc: denied { perfmon } for pid=3898 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.643000 audit[3898]: AVC avc: denied { perfmon } for pid=3898 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.643000 audit[3898]: AVC avc: denied { perfmon } for pid=3898 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.643000 audit[3898]: AVC avc: denied { bpf } for pid=3898 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.643000 audit[3898]: AVC avc: denied { bpf } for pid=3898 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.643000 audit: BPF prog-id=168 op=LOAD Oct 29 04:41:29.643000 audit[3898]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fffc7b45ba0 a2=94 a3=2 items=0 ppid=3392 pid=3898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:29.643000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 29 04:41:29.643000 audit: BPF prog-id=168 op=UNLOAD Oct 29 04:41:29.687775 systemd-networkd[1018]: cali59557ca3006: Gained IPv6LL Oct 29 04:41:29.808893 env[1204]: 2025-10-29 04:41:29.721 [WARNING][3899] cni-plugin/k8s.go 598: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="0a766542938c9a629ef7c3f9b499f1b8c875a6f90bffcd4c7cfd1b1f50f55132" WorkloadEndpoint="srv--jtkau.gb1.brightbox.com-k8s-whisker--5bfb84f6--jwthd-eth0" Oct 29 04:41:29.808893 env[1204]: 2025-10-29 04:41:29.721 [INFO][3899] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="0a766542938c9a629ef7c3f9b499f1b8c875a6f90bffcd4c7cfd1b1f50f55132" Oct 29 04:41:29.808893 env[1204]: 2025-10-29 04:41:29.722 [INFO][3899] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="0a766542938c9a629ef7c3f9b499f1b8c875a6f90bffcd4c7cfd1b1f50f55132" iface="eth0" netns="" Oct 29 04:41:29.808893 env[1204]: 2025-10-29 04:41:29.722 [INFO][3899] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="0a766542938c9a629ef7c3f9b499f1b8c875a6f90bffcd4c7cfd1b1f50f55132" Oct 29 04:41:29.808893 env[1204]: 2025-10-29 04:41:29.722 [INFO][3899] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="0a766542938c9a629ef7c3f9b499f1b8c875a6f90bffcd4c7cfd1b1f50f55132" Oct 29 04:41:29.808893 env[1204]: 2025-10-29 04:41:29.761 [INFO][3910] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="0a766542938c9a629ef7c3f9b499f1b8c875a6f90bffcd4c7cfd1b1f50f55132" HandleID="k8s-pod-network.0a766542938c9a629ef7c3f9b499f1b8c875a6f90bffcd4c7cfd1b1f50f55132" Workload="srv--jtkau.gb1.brightbox.com-k8s-whisker--5bfb84f6--jwthd-eth0" Oct 29 04:41:29.808893 env[1204]: 2025-10-29 04:41:29.762 [INFO][3910] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 29 04:41:29.808893 env[1204]: 2025-10-29 04:41:29.762 [INFO][3910] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 29 04:41:29.808893 env[1204]: 2025-10-29 04:41:29.775 [WARNING][3910] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="0a766542938c9a629ef7c3f9b499f1b8c875a6f90bffcd4c7cfd1b1f50f55132" HandleID="k8s-pod-network.0a766542938c9a629ef7c3f9b499f1b8c875a6f90bffcd4c7cfd1b1f50f55132" Workload="srv--jtkau.gb1.brightbox.com-k8s-whisker--5bfb84f6--jwthd-eth0" Oct 29 04:41:29.808893 env[1204]: 2025-10-29 04:41:29.775 [INFO][3910] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="0a766542938c9a629ef7c3f9b499f1b8c875a6f90bffcd4c7cfd1b1f50f55132" HandleID="k8s-pod-network.0a766542938c9a629ef7c3f9b499f1b8c875a6f90bffcd4c7cfd1b1f50f55132" Workload="srv--jtkau.gb1.brightbox.com-k8s-whisker--5bfb84f6--jwthd-eth0" Oct 29 04:41:29.808893 env[1204]: 2025-10-29 04:41:29.778 [INFO][3910] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 29 04:41:29.808893 env[1204]: 2025-10-29 04:41:29.790 [INFO][3899] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="0a766542938c9a629ef7c3f9b499f1b8c875a6f90bffcd4c7cfd1b1f50f55132" Oct 29 04:41:29.808893 env[1204]: time="2025-10-29T04:41:29.808821258Z" level=info msg="TearDown network for sandbox \"0a766542938c9a629ef7c3f9b499f1b8c875a6f90bffcd4c7cfd1b1f50f55132\" successfully" Oct 29 04:41:29.859008 env[1204]: time="2025-10-29T04:41:29.858904679Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 29 04:41:29.863272 env[1204]: time="2025-10-29T04:41:29.863188925Z" level=info msg="RemovePodSandbox \"0a766542938c9a629ef7c3f9b499f1b8c875a6f90bffcd4c7cfd1b1f50f55132\" returns successfully" Oct 29 04:41:29.868044 env[1204]: time="2025-10-29T04:41:29.867525883Z" level=info msg="StopPodSandbox for \"9041a05e02e36ff51f1c8c799085046320ea35c39cca48c649c91630527e9528\"" Oct 29 04:41:29.868789 env[1204]: time="2025-10-29T04:41:29.868618777Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found" Oct 29 04:41:29.869278 kubelet[1975]: E1029 04:41:29.869228 1975 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.4" Oct 29 04:41:29.869849 kubelet[1975]: E1029 04:41:29.869805 1975 kuberuntime_image.go:55] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.4" Oct 29 04:41:29.870308 kubelet[1975]: E1029 04:41:29.870241 1975 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:whisker-backend,Image:ghcr.io/flatcar/calico/whisker-backend:v3.30.4,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:3002,ValueFrom:nil,},EnvVar{Name:GOLDMANE_HOST,Value:goldmane.calico-system.svc.cluster.local:7443,ValueFrom:nil,},EnvVar{Name:TLS_CERT_PATH,Value:/whisker-backend-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:TLS_KEY_PATH,Value:/whisker-backend-key-pair/tls.key,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:whisker-backend-key-pair,ReadOnly:true,MountPath:/whisker-backend-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:whisker-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-rq4tk,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-7fbcdbccd-mghcv_calico-system(f101f74a-91c5-460d-8026-7c7655b6a631): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found" logger="UnhandledError" Oct 29 04:41:29.880579 env[1204]: time="2025-10-29T04:41:29.876977711Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.4\"" Oct 29 04:41:29.880795 kubelet[1975]: E1029 04:41:29.879299 1975 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found\", failed to \"StartContainer\" for \"whisker-backend\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found\"]" pod="calico-system/whisker-7fbcdbccd-mghcv" podUID="f101f74a-91c5-460d-8026-7c7655b6a631" Oct 29 04:41:29.960000 audit[3865]: AVC avc: denied { getattr } for pid=3865 comm="coredns" path="cgroup:[4026532430]" dev="nsfs" ino=4026532430 scontext=system_u:system_r:svirt_lxc_net_t:s0:c545,c990 tcontext=system_u:object_r:nsfs_t:s0 tclass=file permissive=0 Oct 29 04:41:29.960000 audit[3865]: SYSCALL arch=c000003e syscall=262 success=no exit=-13 a0=ffffffffffffff9c a1=c000156810 a2=c000134fa8 a3=0 items=0 ppid=3739 pid=3865 auid=4294967295 uid=65532 gid=65532 euid=65532 suid=65532 fsuid=65532 egid=65532 sgid=65532 fsgid=65532 tty=(none) ses=4294967295 comm="coredns" exe="/coredns" subj=system_u:system_r:svirt_lxc_net_t:s0:c545,c990 key=(null) Oct 29 04:41:29.960000 audit: PROCTITLE proctitle=2F636F7265646E73002D636F6E66002F6574632F636F7265646E732F436F726566696C65 Oct 29 04:41:29.998000 audit[3898]: AVC avc: denied { bpf } for pid=3898 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.998000 audit[3898]: AVC avc: denied { bpf } for pid=3898 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.998000 audit[3898]: AVC avc: denied { perfmon } for pid=3898 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.998000 audit[3898]: AVC avc: denied { perfmon } for pid=3898 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.998000 audit[3898]: AVC avc: denied { perfmon } for pid=3898 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.998000 audit[3898]: AVC avc: denied { perfmon } for pid=3898 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.998000 audit[3898]: AVC avc: denied { perfmon } for pid=3898 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.998000 audit[3898]: AVC avc: denied { bpf } for pid=3898 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.998000 audit[3898]: AVC avc: denied { bpf } for pid=3898 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.998000 audit: BPF prog-id=169 op=LOAD Oct 29 04:41:29.998000 audit[3898]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fffc7b45a60 a2=94 a3=1 items=0 ppid=3392 pid=3898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:29.998000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 29 04:41:29.998000 audit: BPF prog-id=169 op=UNLOAD Oct 29 04:41:29.998000 audit[3898]: AVC avc: denied { perfmon } for pid=3898 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:29.998000 audit[3898]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fffc7b45b30 a2=50 a3=7fffc7b45c10 items=0 ppid=3392 pid=3898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:29.998000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 29 04:41:30.019000 audit[3937]: NETFILTER_CFG table=filter:105 family=2 entries=20 op=nft_register_rule pid=3937 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 29 04:41:30.019000 audit[3937]: SYSCALL arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7fffd080e250 a2=0 a3=7fffd080e23c items=0 ppid=2117 pid=3937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:30.019000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 29 04:41:30.026000 audit[3937]: NETFILTER_CFG table=nat:106 family=2 entries=14 op=nft_register_rule pid=3937 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 29 04:41:30.026000 audit[3937]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7fffd080e250 a2=0 a3=0 items=0 ppid=2117 pid=3937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:30.026000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 29 04:41:30.034000 audit[3898]: AVC avc: denied { bpf } for pid=3898 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.034000 audit[3898]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffc7b45a70 a2=28 a3=0 items=0 ppid=3392 pid=3898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:30.034000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 29 04:41:30.035000 audit[3898]: AVC avc: denied { bpf } for pid=3898 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.035000 audit[3898]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffc7b45aa0 a2=28 a3=0 items=0 ppid=3392 pid=3898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:30.035000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 29 04:41:30.036000 audit[3898]: AVC avc: denied { bpf } for pid=3898 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.036000 audit[3898]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffc7b459b0 a2=28 a3=0 items=0 ppid=3392 pid=3898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:30.036000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 29 04:41:30.036000 audit[3898]: AVC avc: denied { bpf } for pid=3898 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.036000 audit[3898]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffc7b45ac0 a2=28 a3=0 items=0 ppid=3392 pid=3898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:30.036000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 29 04:41:30.037000 audit[3898]: AVC avc: denied { bpf } for pid=3898 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.037000 audit[3898]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffc7b45aa0 a2=28 a3=0 items=0 ppid=3392 pid=3898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:30.037000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 29 04:41:30.037000 audit[3898]: AVC avc: denied { bpf } for pid=3898 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.037000 audit[3898]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffc7b45a90 a2=28 a3=0 items=0 ppid=3392 pid=3898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:30.037000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 29 04:41:30.038000 audit[3898]: AVC avc: denied { bpf } for pid=3898 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.038000 audit[3898]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffc7b45ac0 a2=28 a3=0 items=0 ppid=3392 pid=3898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:30.038000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 29 04:41:30.039000 audit[3898]: AVC avc: denied { bpf } for pid=3898 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.039000 audit[3898]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffc7b45aa0 a2=28 a3=0 items=0 ppid=3392 pid=3898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:30.039000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 29 04:41:30.040000 audit[3898]: AVC avc: denied { bpf } for pid=3898 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.040000 audit[3898]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffc7b45ac0 a2=28 a3=0 items=0 ppid=3392 pid=3898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:30.040000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 29 04:41:30.040000 audit[3898]: AVC avc: denied { bpf } for pid=3898 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.040000 audit[3898]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffc7b45a90 a2=28 a3=0 items=0 ppid=3392 pid=3898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:30.040000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 29 04:41:30.041000 audit[3898]: AVC avc: denied { bpf } for pid=3898 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.041000 audit[3898]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffc7b45b00 a2=28 a3=0 items=0 ppid=3392 pid=3898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:30.041000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 29 04:41:30.042000 audit[3898]: AVC avc: denied { perfmon } for pid=3898 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.042000 audit[3898]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fffc7b458b0 a2=50 a3=1 items=0 ppid=3392 pid=3898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:30.042000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 29 04:41:30.043000 audit[3898]: AVC avc: denied { bpf } for pid=3898 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.043000 audit[3898]: AVC avc: denied { bpf } for pid=3898 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.043000 audit[3898]: AVC avc: denied { perfmon } for pid=3898 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.043000 audit[3898]: AVC avc: denied { perfmon } for pid=3898 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.043000 audit[3898]: AVC avc: denied { perfmon } for pid=3898 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.043000 audit[3898]: AVC avc: denied { perfmon } for pid=3898 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.043000 audit[3898]: AVC avc: denied { perfmon } for pid=3898 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.043000 audit[3898]: AVC avc: denied { bpf } for pid=3898 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.043000 audit[3898]: AVC avc: denied { bpf } for pid=3898 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.043000 audit: BPF prog-id=170 op=LOAD Oct 29 04:41:30.043000 audit[3898]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fffc7b458b0 a2=94 a3=5 items=0 ppid=3392 pid=3898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:30.043000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 29 04:41:30.046000 audit: BPF prog-id=170 op=UNLOAD Oct 29 04:41:30.046000 audit[3898]: AVC avc: denied { perfmon } for pid=3898 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.046000 audit[3898]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fffc7b45960 a2=50 a3=1 items=0 ppid=3392 pid=3898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:30.046000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 29 04:41:30.047000 audit[3898]: AVC avc: denied { bpf } for pid=3898 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.047000 audit[3898]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7fffc7b45a80 a2=4 a3=38 items=0 ppid=3392 pid=3898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:30.047000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 29 04:41:30.047000 audit[3898]: AVC avc: denied { bpf } for pid=3898 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.047000 audit[3898]: AVC avc: denied { bpf } for pid=3898 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.047000 audit[3898]: AVC avc: denied { perfmon } for pid=3898 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.047000 audit[3898]: AVC avc: denied { bpf } for pid=3898 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.047000 audit[3898]: AVC avc: denied { perfmon } for pid=3898 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.047000 audit[3898]: AVC avc: denied { perfmon } for pid=3898 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.047000 audit[3898]: AVC avc: denied { perfmon } for pid=3898 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.047000 audit[3898]: AVC avc: denied { perfmon } for pid=3898 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.047000 audit[3898]: AVC avc: denied { perfmon } for pid=3898 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.047000 audit[3898]: AVC avc: denied { bpf } for pid=3898 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.047000 audit[3898]: AVC avc: denied { confidentiality } for pid=3898 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:41:30.047000 audit[3898]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fffc7b45ad0 a2=94 a3=6 items=0 ppid=3392 pid=3898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:30.047000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 29 04:41:30.050000 audit[3898]: AVC avc: denied { bpf } for pid=3898 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.050000 audit[3898]: AVC avc: denied { bpf } for pid=3898 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.050000 audit[3898]: AVC avc: denied { perfmon } for pid=3898 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.050000 audit[3898]: AVC avc: denied { bpf } for pid=3898 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.050000 audit[3898]: AVC avc: denied { perfmon } for pid=3898 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.050000 audit[3898]: AVC avc: denied { perfmon } for pid=3898 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.050000 audit[3898]: AVC avc: denied { perfmon } for pid=3898 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.050000 audit[3898]: AVC avc: denied { perfmon } for pid=3898 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.050000 audit[3898]: AVC avc: denied { perfmon } for pid=3898 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.050000 audit[3898]: AVC avc: denied { bpf } for pid=3898 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.050000 audit[3898]: AVC avc: denied { confidentiality } for pid=3898 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:41:30.050000 audit[3898]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fffc7b45280 a2=94 a3=88 items=0 ppid=3392 pid=3898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:30.050000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 29 04:41:30.052000 audit[3898]: AVC avc: denied { bpf } for pid=3898 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.052000 audit[3898]: AVC avc: denied { bpf } for pid=3898 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.052000 audit[3898]: AVC avc: denied { perfmon } for pid=3898 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.052000 audit[3898]: AVC avc: denied { bpf } for pid=3898 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.052000 audit[3898]: AVC avc: denied { perfmon } for pid=3898 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.052000 audit[3898]: AVC avc: denied { perfmon } for pid=3898 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.052000 audit[3898]: AVC avc: denied { perfmon } for pid=3898 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.052000 audit[3898]: AVC avc: denied { perfmon } for pid=3898 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.052000 audit[3898]: AVC avc: denied { perfmon } for pid=3898 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.052000 audit[3898]: AVC avc: denied { bpf } for pid=3898 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.052000 audit[3898]: AVC avc: denied { confidentiality } for pid=3898 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:41:30.052000 audit[3898]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fffc7b45280 a2=94 a3=88 items=0 ppid=3392 pid=3898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:30.052000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Oct 29 04:41:30.061579 env[1204]: 2025-10-29 04:41:29.973 [WARNING][3924] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="9041a05e02e36ff51f1c8c799085046320ea35c39cca48c649c91630527e9528" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--jtkau.gb1.brightbox.com-k8s-csi--node--driver--d8hbp-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"78135185-6b36-431d-89d1-d452e0f3a516", ResourceVersion:"965", Generation:0, CreationTimestamp:time.Date(2025, time.October, 29, 4, 40, 53, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"857b56db8f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-jtkau.gb1.brightbox.com", ContainerID:"b3cf47911057c0124c626fa7b3421742a296ba41d4c81c6cc2476d9d97284bef", Pod:"csi-node-driver-d8hbp", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.110.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali680f84ab990", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 29 04:41:30.061579 env[1204]: 2025-10-29 04:41:29.974 [INFO][3924] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="9041a05e02e36ff51f1c8c799085046320ea35c39cca48c649c91630527e9528" Oct 29 04:41:30.061579 env[1204]: 2025-10-29 04:41:29.974 [INFO][3924] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="9041a05e02e36ff51f1c8c799085046320ea35c39cca48c649c91630527e9528" iface="eth0" netns="" Oct 29 04:41:30.061579 env[1204]: 2025-10-29 04:41:29.974 [INFO][3924] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="9041a05e02e36ff51f1c8c799085046320ea35c39cca48c649c91630527e9528" Oct 29 04:41:30.061579 env[1204]: 2025-10-29 04:41:29.974 [INFO][3924] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="9041a05e02e36ff51f1c8c799085046320ea35c39cca48c649c91630527e9528" Oct 29 04:41:30.061579 env[1204]: 2025-10-29 04:41:30.041 [INFO][3932] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="9041a05e02e36ff51f1c8c799085046320ea35c39cca48c649c91630527e9528" HandleID="k8s-pod-network.9041a05e02e36ff51f1c8c799085046320ea35c39cca48c649c91630527e9528" Workload="srv--jtkau.gb1.brightbox.com-k8s-csi--node--driver--d8hbp-eth0" Oct 29 04:41:30.061579 env[1204]: 2025-10-29 04:41:30.041 [INFO][3932] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 29 04:41:30.061579 env[1204]: 2025-10-29 04:41:30.041 [INFO][3932] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 29 04:41:30.061579 env[1204]: 2025-10-29 04:41:30.053 [WARNING][3932] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="9041a05e02e36ff51f1c8c799085046320ea35c39cca48c649c91630527e9528" HandleID="k8s-pod-network.9041a05e02e36ff51f1c8c799085046320ea35c39cca48c649c91630527e9528" Workload="srv--jtkau.gb1.brightbox.com-k8s-csi--node--driver--d8hbp-eth0" Oct 29 04:41:30.061579 env[1204]: 2025-10-29 04:41:30.053 [INFO][3932] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="9041a05e02e36ff51f1c8c799085046320ea35c39cca48c649c91630527e9528" HandleID="k8s-pod-network.9041a05e02e36ff51f1c8c799085046320ea35c39cca48c649c91630527e9528" Workload="srv--jtkau.gb1.brightbox.com-k8s-csi--node--driver--d8hbp-eth0" Oct 29 04:41:30.061579 env[1204]: 2025-10-29 04:41:30.056 [INFO][3932] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 29 04:41:30.061579 env[1204]: 2025-10-29 04:41:30.058 [INFO][3924] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="9041a05e02e36ff51f1c8c799085046320ea35c39cca48c649c91630527e9528" Oct 29 04:41:30.061579 env[1204]: time="2025-10-29T04:41:30.060987608Z" level=info msg="TearDown network for sandbox \"9041a05e02e36ff51f1c8c799085046320ea35c39cca48c649c91630527e9528\" successfully" Oct 29 04:41:30.061579 env[1204]: time="2025-10-29T04:41:30.061035774Z" level=info msg="StopPodSandbox for \"9041a05e02e36ff51f1c8c799085046320ea35c39cca48c649c91630527e9528\" returns successfully" Oct 29 04:41:30.063384 env[1204]: time="2025-10-29T04:41:30.062833821Z" level=info msg="RemovePodSandbox for \"9041a05e02e36ff51f1c8c799085046320ea35c39cca48c649c91630527e9528\"" Oct 29 04:41:30.063384 env[1204]: time="2025-10-29T04:41:30.062880352Z" level=info msg="Forcibly stopping sandbox \"9041a05e02e36ff51f1c8c799085046320ea35c39cca48c649c91630527e9528\"" Oct 29 04:41:30.101000 audit[3955]: AVC avc: denied { bpf } for pid=3955 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.101000 audit[3955]: AVC avc: denied { bpf } for pid=3955 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.101000 audit[3955]: AVC avc: denied { perfmon } for pid=3955 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.101000 audit[3955]: AVC avc: denied { perfmon } for pid=3955 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.101000 audit[3955]: AVC avc: denied { perfmon } for pid=3955 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.101000 audit[3955]: AVC avc: denied { perfmon } for pid=3955 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.101000 audit[3955]: AVC avc: denied { perfmon } for pid=3955 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.101000 audit[3955]: AVC avc: denied { bpf } for pid=3955 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.101000 audit[3955]: AVC avc: denied { bpf } for pid=3955 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.101000 audit: BPF prog-id=171 op=LOAD Oct 29 04:41:30.101000 audit[3955]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff038f0720 a2=98 a3=1999999999999999 items=0 ppid=3392 pid=3955 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:30.101000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Oct 29 04:41:30.103000 audit: BPF prog-id=171 op=UNLOAD Oct 29 04:41:30.103000 audit[3955]: AVC avc: denied { bpf } for pid=3955 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.103000 audit[3955]: AVC avc: denied { bpf } for pid=3955 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.103000 audit[3955]: AVC avc: denied { perfmon } for pid=3955 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.103000 audit[3955]: AVC avc: denied { perfmon } for pid=3955 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.103000 audit[3955]: AVC avc: denied { perfmon } for pid=3955 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.103000 audit[3955]: AVC avc: denied { perfmon } for pid=3955 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.103000 audit[3955]: AVC avc: denied { perfmon } for pid=3955 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.103000 audit[3955]: AVC avc: denied { bpf } for pid=3955 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.103000 audit[3955]: AVC avc: denied { bpf } for pid=3955 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.103000 audit: BPF prog-id=172 op=LOAD Oct 29 04:41:30.103000 audit[3955]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff038f0600 a2=94 a3=ffff items=0 ppid=3392 pid=3955 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:30.103000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Oct 29 04:41:30.104000 audit: BPF prog-id=172 op=UNLOAD Oct 29 04:41:30.104000 audit[3955]: AVC avc: denied { bpf } for pid=3955 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.104000 audit[3955]: AVC avc: denied { bpf } for pid=3955 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.104000 audit[3955]: AVC avc: denied { perfmon } for pid=3955 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.104000 audit[3955]: AVC avc: denied { perfmon } for pid=3955 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.104000 audit[3955]: AVC avc: denied { perfmon } for pid=3955 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.104000 audit[3955]: AVC avc: denied { perfmon } for pid=3955 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.104000 audit[3955]: AVC avc: denied { perfmon } for pid=3955 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.104000 audit[3955]: AVC avc: denied { bpf } for pid=3955 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.104000 audit[3955]: AVC avc: denied { bpf } for pid=3955 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.104000 audit: BPF prog-id=173 op=LOAD Oct 29 04:41:30.104000 audit[3955]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff038f0640 a2=94 a3=7fff038f0820 items=0 ppid=3392 pid=3955 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:30.104000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Oct 29 04:41:30.105000 audit: BPF prog-id=173 op=UNLOAD Oct 29 04:41:30.199623 env[1204]: time="2025-10-29T04:41:30.199254566Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 29 04:41:30.204103 env[1204]: time="2025-10-29T04:41:30.204044343Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found" Oct 29 04:41:30.204731 kubelet[1975]: E1029 04:41:30.204631 1975 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found" image="ghcr.io/flatcar/calico/goldmane:v3.30.4" Oct 29 04:41:30.204856 kubelet[1975]: E1029 04:41:30.204758 1975 kuberuntime_image.go:55] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found" image="ghcr.io/flatcar/calico/goldmane:v3.30.4" Oct 29 04:41:30.205695 env[1204]: time="2025-10-29T04:41:30.205648591Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\"" Oct 29 04:41:30.206937 kubelet[1975]: E1029 04:41:30.206839 1975 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:goldmane,Image:ghcr.io/flatcar/calico/goldmane:v3.30.4,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:7443,ValueFrom:nil,},EnvVar{Name:SERVER_CERT_PATH,Value:/goldmane-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:SERVER_KEY_PATH,Value:/goldmane-key-pair/tls.key,ValueFrom:nil,},EnvVar{Name:CA_CERT_PATH,Value:/etc/pki/tls/certs/tigera-ca-bundle.crt,ValueFrom:nil,},EnvVar{Name:PUSH_URL,Value:https://guardian.calico-system.svc.cluster.local:443/api/v1/flows/bulk,ValueFrom:nil,},EnvVar{Name:FILE_CONFIG_PATH,Value:/config/config.json,ValueFrom:nil,},EnvVar{Name:HEALTH_ENABLED,Value:true,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:config,ReadOnly:true,MountPath:/config,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-key-pair,ReadOnly:true,MountPath:/goldmane-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-zbz8q,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -live],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -ready],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:30,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod goldmane-666569f655-w7zrh_calico-system(4809fb25-1663-4bc2-b12f-599470e2bb91): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found" logger="UnhandledError" Oct 29 04:41:30.209696 kubelet[1975]: E1029 04:41:30.209642 1975 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found\"" pod="calico-system/goldmane-666569f655-w7zrh" podUID="4809fb25-1663-4bc2-b12f-599470e2bb91" Oct 29 04:41:30.264936 env[1204]: 2025-10-29 04:41:30.165 [WARNING][3951] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="9041a05e02e36ff51f1c8c799085046320ea35c39cca48c649c91630527e9528" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--jtkau.gb1.brightbox.com-k8s-csi--node--driver--d8hbp-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"78135185-6b36-431d-89d1-d452e0f3a516", ResourceVersion:"965", Generation:0, CreationTimestamp:time.Date(2025, time.October, 29, 4, 40, 53, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"857b56db8f", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-jtkau.gb1.brightbox.com", ContainerID:"b3cf47911057c0124c626fa7b3421742a296ba41d4c81c6cc2476d9d97284bef", Pod:"csi-node-driver-d8hbp", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.110.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali680f84ab990", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 29 04:41:30.264936 env[1204]: 2025-10-29 04:41:30.165 [INFO][3951] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="9041a05e02e36ff51f1c8c799085046320ea35c39cca48c649c91630527e9528" Oct 29 04:41:30.264936 env[1204]: 2025-10-29 04:41:30.165 [INFO][3951] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="9041a05e02e36ff51f1c8c799085046320ea35c39cca48c649c91630527e9528" iface="eth0" netns="" Oct 29 04:41:30.264936 env[1204]: 2025-10-29 04:41:30.165 [INFO][3951] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="9041a05e02e36ff51f1c8c799085046320ea35c39cca48c649c91630527e9528" Oct 29 04:41:30.264936 env[1204]: 2025-10-29 04:41:30.165 [INFO][3951] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="9041a05e02e36ff51f1c8c799085046320ea35c39cca48c649c91630527e9528" Oct 29 04:41:30.264936 env[1204]: 2025-10-29 04:41:30.243 [INFO][3971] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="9041a05e02e36ff51f1c8c799085046320ea35c39cca48c649c91630527e9528" HandleID="k8s-pod-network.9041a05e02e36ff51f1c8c799085046320ea35c39cca48c649c91630527e9528" Workload="srv--jtkau.gb1.brightbox.com-k8s-csi--node--driver--d8hbp-eth0" Oct 29 04:41:30.264936 env[1204]: 2025-10-29 04:41:30.243 [INFO][3971] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 29 04:41:30.264936 env[1204]: 2025-10-29 04:41:30.243 [INFO][3971] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 29 04:41:30.264936 env[1204]: 2025-10-29 04:41:30.257 [WARNING][3971] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="9041a05e02e36ff51f1c8c799085046320ea35c39cca48c649c91630527e9528" HandleID="k8s-pod-network.9041a05e02e36ff51f1c8c799085046320ea35c39cca48c649c91630527e9528" Workload="srv--jtkau.gb1.brightbox.com-k8s-csi--node--driver--d8hbp-eth0" Oct 29 04:41:30.264936 env[1204]: 2025-10-29 04:41:30.257 [INFO][3971] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="9041a05e02e36ff51f1c8c799085046320ea35c39cca48c649c91630527e9528" HandleID="k8s-pod-network.9041a05e02e36ff51f1c8c799085046320ea35c39cca48c649c91630527e9528" Workload="srv--jtkau.gb1.brightbox.com-k8s-csi--node--driver--d8hbp-eth0" Oct 29 04:41:30.264936 env[1204]: 2025-10-29 04:41:30.260 [INFO][3971] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 29 04:41:30.264936 env[1204]: 2025-10-29 04:41:30.262 [INFO][3951] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="9041a05e02e36ff51f1c8c799085046320ea35c39cca48c649c91630527e9528" Oct 29 04:41:30.265783 env[1204]: time="2025-10-29T04:41:30.264982525Z" level=info msg="TearDown network for sandbox \"9041a05e02e36ff51f1c8c799085046320ea35c39cca48c649c91630527e9528\" successfully" Oct 29 04:41:30.268632 env[1204]: time="2025-10-29T04:41:30.268576303Z" level=info msg="RemovePodSandbox \"9041a05e02e36ff51f1c8c799085046320ea35c39cca48c649c91630527e9528\" returns successfully" Oct 29 04:41:30.304716 systemd-networkd[1018]: cali3adb2a352a9: Gained IPv6LL Oct 29 04:41:30.334416 systemd-networkd[1018]: vxlan.calico: Link UP Oct 29 04:41:30.334427 systemd-networkd[1018]: vxlan.calico: Gained carrier Oct 29 04:41:30.387000 audit[3993]: AVC avc: denied { bpf } for pid=3993 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.387000 audit[3993]: AVC avc: denied { bpf } for pid=3993 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.387000 audit[3993]: AVC avc: denied { perfmon } for pid=3993 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.387000 audit[3993]: AVC avc: denied { perfmon } for pid=3993 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.387000 audit[3993]: AVC avc: denied { perfmon } for pid=3993 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.387000 audit[3993]: AVC avc: denied { perfmon } for pid=3993 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.387000 audit[3993]: AVC avc: denied { perfmon } for pid=3993 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.387000 audit[3993]: AVC avc: denied { bpf } for pid=3993 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.387000 audit[3993]: AVC avc: denied { bpf } for pid=3993 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.387000 audit: BPF prog-id=174 op=LOAD Oct 29 04:41:30.387000 audit[3993]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcd08e4990 a2=98 a3=20 items=0 ppid=3392 pid=3993 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:30.387000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 29 04:41:30.388000 audit: BPF prog-id=174 op=UNLOAD Oct 29 04:41:30.389000 audit[3993]: AVC avc: denied { bpf } for pid=3993 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.389000 audit[3993]: AVC avc: denied { bpf } for pid=3993 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.389000 audit[3993]: AVC avc: denied { perfmon } for pid=3993 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.389000 audit[3993]: AVC avc: denied { perfmon } for pid=3993 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.389000 audit[3993]: AVC avc: denied { perfmon } for pid=3993 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.389000 audit[3993]: AVC avc: denied { perfmon } for pid=3993 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.389000 audit[3993]: AVC avc: denied { perfmon } for pid=3993 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.389000 audit[3993]: AVC avc: denied { bpf } for pid=3993 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.389000 audit[3993]: AVC avc: denied { bpf } for pid=3993 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.389000 audit: BPF prog-id=175 op=LOAD Oct 29 04:41:30.389000 audit[3993]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcd08e47a0 a2=94 a3=54428f items=0 ppid=3392 pid=3993 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:30.389000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 29 04:41:30.389000 audit: BPF prog-id=175 op=UNLOAD Oct 29 04:41:30.389000 audit[3993]: AVC avc: denied { bpf } for pid=3993 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.389000 audit[3993]: AVC avc: denied { bpf } for pid=3993 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.389000 audit[3993]: AVC avc: denied { perfmon } for pid=3993 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.389000 audit[3993]: AVC avc: denied { perfmon } for pid=3993 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.389000 audit[3993]: AVC avc: denied { perfmon } for pid=3993 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.389000 audit[3993]: AVC avc: denied { perfmon } for pid=3993 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.389000 audit[3993]: AVC avc: denied { perfmon } for pid=3993 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.389000 audit[3993]: AVC avc: denied { bpf } for pid=3993 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.389000 audit[3993]: AVC avc: denied { bpf } for pid=3993 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.389000 audit: BPF prog-id=176 op=LOAD Oct 29 04:41:30.389000 audit[3993]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffcd08e47d0 a2=94 a3=2 items=0 ppid=3392 pid=3993 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:30.389000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 29 04:41:30.389000 audit: BPF prog-id=176 op=UNLOAD Oct 29 04:41:30.389000 audit[3993]: AVC avc: denied { bpf } for pid=3993 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.389000 audit[3993]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffcd08e46a0 a2=28 a3=0 items=0 ppid=3392 pid=3993 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:30.389000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 29 04:41:30.389000 audit[3993]: AVC avc: denied { bpf } for pid=3993 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.389000 audit[3993]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcd08e46d0 a2=28 a3=0 items=0 ppid=3392 pid=3993 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:30.389000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 29 04:41:30.389000 audit[3993]: AVC avc: denied { bpf } for pid=3993 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.389000 audit[3993]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcd08e45e0 a2=28 a3=0 items=0 ppid=3392 pid=3993 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:30.389000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 29 04:41:30.389000 audit[3993]: AVC avc: denied { bpf } for pid=3993 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.389000 audit[3993]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffcd08e46f0 a2=28 a3=0 items=0 ppid=3392 pid=3993 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:30.389000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 29 04:41:30.390000 audit[3993]: AVC avc: denied { bpf } for pid=3993 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.390000 audit[3993]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffcd08e46d0 a2=28 a3=0 items=0 ppid=3392 pid=3993 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:30.390000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 29 04:41:30.390000 audit[3993]: AVC avc: denied { bpf } for pid=3993 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.390000 audit[3993]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffcd08e46c0 a2=28 a3=0 items=0 ppid=3392 pid=3993 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:30.390000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 29 04:41:30.390000 audit[3993]: AVC avc: denied { bpf } for pid=3993 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.390000 audit[3993]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffcd08e46f0 a2=28 a3=0 items=0 ppid=3392 pid=3993 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:30.390000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 29 04:41:30.390000 audit[3993]: AVC avc: denied { bpf } for pid=3993 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.390000 audit[3993]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcd08e46d0 a2=28 a3=0 items=0 ppid=3392 pid=3993 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:30.390000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 29 04:41:30.390000 audit[3993]: AVC avc: denied { bpf } for pid=3993 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.390000 audit[3993]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcd08e46f0 a2=28 a3=0 items=0 ppid=3392 pid=3993 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:30.390000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 29 04:41:30.390000 audit[3993]: AVC avc: denied { bpf } for pid=3993 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.390000 audit[3993]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffcd08e46c0 a2=28 a3=0 items=0 ppid=3392 pid=3993 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:30.390000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 29 04:41:30.390000 audit[3993]: AVC avc: denied { bpf } for pid=3993 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.390000 audit[3993]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffcd08e4730 a2=28 a3=0 items=0 ppid=3392 pid=3993 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:30.390000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 29 04:41:30.390000 audit[3993]: AVC avc: denied { bpf } for pid=3993 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.390000 audit[3993]: AVC avc: denied { bpf } for pid=3993 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.390000 audit[3993]: AVC avc: denied { perfmon } for pid=3993 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.390000 audit[3993]: AVC avc: denied { perfmon } for pid=3993 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.390000 audit[3993]: AVC avc: denied { perfmon } for pid=3993 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.390000 audit[3993]: AVC avc: denied { perfmon } for pid=3993 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.390000 audit[3993]: AVC avc: denied { perfmon } for pid=3993 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.390000 audit[3993]: AVC avc: denied { bpf } for pid=3993 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.390000 audit[3993]: AVC avc: denied { bpf } for pid=3993 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.390000 audit: BPF prog-id=177 op=LOAD Oct 29 04:41:30.390000 audit[3993]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffcd08e45a0 a2=94 a3=0 items=0 ppid=3392 pid=3993 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:30.390000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 29 04:41:30.390000 audit: BPF prog-id=177 op=UNLOAD Oct 29 04:41:30.391000 audit[3993]: AVC avc: denied { bpf } for pid=3993 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.391000 audit[3993]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffcd08e4590 a2=50 a3=2800 items=0 ppid=3392 pid=3993 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:30.391000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 29 04:41:30.399000 audit[3993]: AVC avc: denied { bpf } for pid=3993 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.399000 audit[3993]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffcd08e4590 a2=50 a3=2800 items=0 ppid=3392 pid=3993 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:30.399000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 29 04:41:30.399000 audit[3993]: AVC avc: denied { bpf } for pid=3993 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.399000 audit[3993]: AVC avc: denied { bpf } for pid=3993 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.399000 audit[3993]: AVC avc: denied { bpf } for pid=3993 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.399000 audit[3993]: AVC avc: denied { perfmon } for pid=3993 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.399000 audit[3993]: AVC avc: denied { perfmon } for pid=3993 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.399000 audit[3993]: AVC avc: denied { perfmon } for pid=3993 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.399000 audit[3993]: AVC avc: denied { perfmon } for pid=3993 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.399000 audit[3993]: AVC avc: denied { perfmon } for pid=3993 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.399000 audit[3993]: AVC avc: denied { bpf } for pid=3993 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.399000 audit[3993]: AVC avc: denied { bpf } for pid=3993 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.399000 audit: BPF prog-id=178 op=LOAD Oct 29 04:41:30.399000 audit[3993]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffcd08e3db0 a2=94 a3=2 items=0 ppid=3392 pid=3993 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:30.399000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 29 04:41:30.399000 audit: BPF prog-id=178 op=UNLOAD Oct 29 04:41:30.399000 audit[3993]: AVC avc: denied { bpf } for pid=3993 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.399000 audit[3993]: AVC avc: denied { bpf } for pid=3993 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.399000 audit[3993]: AVC avc: denied { bpf } for pid=3993 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.399000 audit[3993]: AVC avc: denied { perfmon } for pid=3993 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.399000 audit[3993]: AVC avc: denied { perfmon } for pid=3993 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.399000 audit[3993]: AVC avc: denied { perfmon } for pid=3993 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.399000 audit[3993]: AVC avc: denied { perfmon } for pid=3993 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.399000 audit[3993]: AVC avc: denied { perfmon } for pid=3993 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.399000 audit[3993]: AVC avc: denied { bpf } for pid=3993 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.399000 audit[3993]: AVC avc: denied { bpf } for pid=3993 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.399000 audit: BPF prog-id=179 op=LOAD Oct 29 04:41:30.399000 audit[3993]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffcd08e3eb0 a2=94 a3=30 items=0 ppid=3392 pid=3993 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:30.399000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Oct 29 04:41:30.433000 audit[4009]: AVC avc: denied { bpf } for pid=4009 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.433000 audit[4009]: AVC avc: denied { bpf } for pid=4009 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.433000 audit[4009]: AVC avc: denied { perfmon } for pid=4009 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.433000 audit[4009]: AVC avc: denied { perfmon } for pid=4009 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.433000 audit[4009]: AVC avc: denied { perfmon } for pid=4009 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.433000 audit[4009]: AVC avc: denied { perfmon } for pid=4009 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.433000 audit[4009]: AVC avc: denied { perfmon } for pid=4009 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.433000 audit[4009]: AVC avc: denied { bpf } for pid=4009 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.433000 audit[4009]: AVC avc: denied { bpf } for pid=4009 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.433000 audit: BPF prog-id=180 op=LOAD Oct 29 04:41:30.433000 audit[4009]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff26b436c0 a2=98 a3=0 items=0 ppid=3392 pid=4009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:30.433000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 29 04:41:30.433000 audit: BPF prog-id=180 op=UNLOAD Oct 29 04:41:30.433000 audit[4009]: AVC avc: denied { bpf } for pid=4009 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.433000 audit[4009]: AVC avc: denied { bpf } for pid=4009 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.433000 audit[4009]: AVC avc: denied { perfmon } for pid=4009 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.433000 audit[4009]: AVC avc: denied { perfmon } for pid=4009 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.433000 audit[4009]: AVC avc: denied { perfmon } for pid=4009 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.433000 audit[4009]: AVC avc: denied { perfmon } for pid=4009 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.433000 audit[4009]: AVC avc: denied { perfmon } for pid=4009 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.433000 audit[4009]: AVC avc: denied { bpf } for pid=4009 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.433000 audit[4009]: AVC avc: denied { bpf } for pid=4009 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.433000 audit: BPF prog-id=181 op=LOAD Oct 29 04:41:30.433000 audit[4009]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff26b434b0 a2=94 a3=54428f items=0 ppid=3392 pid=4009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:30.433000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 29 04:41:30.433000 audit: BPF prog-id=181 op=UNLOAD Oct 29 04:41:30.433000 audit[4009]: AVC avc: denied { bpf } for pid=4009 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.433000 audit[4009]: AVC avc: denied { bpf } for pid=4009 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.433000 audit[4009]: AVC avc: denied { perfmon } for pid=4009 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.433000 audit[4009]: AVC avc: denied { perfmon } for pid=4009 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.433000 audit[4009]: AVC avc: denied { perfmon } for pid=4009 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.433000 audit[4009]: AVC avc: denied { perfmon } for pid=4009 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.433000 audit[4009]: AVC avc: denied { perfmon } for pid=4009 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.433000 audit[4009]: AVC avc: denied { bpf } for pid=4009 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.433000 audit[4009]: AVC avc: denied { bpf } for pid=4009 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.433000 audit: BPF prog-id=182 op=LOAD Oct 29 04:41:30.433000 audit[4009]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff26b434e0 a2=94 a3=2 items=0 ppid=3392 pid=4009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:30.433000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 29 04:41:30.433000 audit: BPF prog-id=182 op=UNLOAD Oct 29 04:41:30.497017 systemd-networkd[1018]: calid5c4aabe7be: Gained IPv6LL Oct 29 04:41:30.508219 env[1204]: time="2025-10-29T04:41:30.507958936Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 29 04:41:30.509275 env[1204]: time="2025-10-29T04:41:30.509073556Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found" Oct 29 04:41:30.509697 kubelet[1975]: E1029 04:41:30.509634 1975 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found" image="ghcr.io/flatcar/calico/kube-controllers:v3.30.4" Oct 29 04:41:30.509797 kubelet[1975]: E1029 04:41:30.509720 1975 kuberuntime_image.go:55] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found" image="ghcr.io/flatcar/calico/kube-controllers:v3.30.4" Oct 29 04:41:30.510125 kubelet[1975]: E1029 04:41:30.510031 1975 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:calico-kube-controllers,Image:ghcr.io/flatcar/calico/kube-controllers:v3.30.4,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:KUBE_CONTROLLERS_CONFIG_NAME,Value:default,ValueFrom:nil,},EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:ENABLED_CONTROLLERS,Value:node,loadbalancer,ValueFrom:nil,},EnvVar{Name:DISABLE_KUBE_CONTROLLERS_CONFIG_API,Value:false,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:CA_CRT_PATH,Value:/etc/pki/tls/certs/tigera-ca-bundle.crt,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:tigera-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:tigera-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/cert.pem,SubPath:ca-bundle.crt,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-kp7fs,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/usr/bin/check-status -l],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:10,TimeoutSeconds:10,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:6,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/usr/bin/check-status -r],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:10,PeriodSeconds:30,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*999,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod calico-kube-controllers-76dd6544c7-psclk_calico-system(7c4e2a15-2feb-448f-b8ed-a786076858ec): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found" logger="UnhandledError" Oct 29 04:41:30.512266 kubelet[1975]: E1029 04:41:30.511584 1975 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-kube-controllers\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found\"" pod="calico-system/calico-kube-controllers-76dd6544c7-psclk" podUID="7c4e2a15-2feb-448f-b8ed-a786076858ec" Oct 29 04:41:30.607000 audit[4009]: AVC avc: denied { bpf } for pid=4009 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.607000 audit[4009]: AVC avc: denied { bpf } for pid=4009 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.607000 audit[4009]: AVC avc: denied { perfmon } for pid=4009 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.607000 audit[4009]: AVC avc: denied { perfmon } for pid=4009 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.607000 audit[4009]: AVC avc: denied { perfmon } for pid=4009 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.607000 audit[4009]: AVC avc: denied { perfmon } for pid=4009 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.607000 audit[4009]: AVC avc: denied { perfmon } for pid=4009 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.607000 audit[4009]: AVC avc: denied { bpf } for pid=4009 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.607000 audit[4009]: AVC avc: denied { bpf } for pid=4009 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.607000 audit: BPF prog-id=183 op=LOAD Oct 29 04:41:30.607000 audit[4009]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff26b433a0 a2=94 a3=1 items=0 ppid=3392 pid=4009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:30.607000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 29 04:41:30.608000 audit: BPF prog-id=183 op=UNLOAD Oct 29 04:41:30.608000 audit[4009]: AVC avc: denied { perfmon } for pid=4009 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.608000 audit[4009]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fff26b43470 a2=50 a3=7fff26b43550 items=0 ppid=3392 pid=4009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:30.608000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 29 04:41:30.624000 audit[4009]: AVC avc: denied { bpf } for pid=4009 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.624000 audit[4009]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff26b433b0 a2=28 a3=0 items=0 ppid=3392 pid=4009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:30.624000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 29 04:41:30.624000 audit[4009]: AVC avc: denied { bpf } for pid=4009 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.624000 audit[4009]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff26b433e0 a2=28 a3=0 items=0 ppid=3392 pid=4009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:30.624000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 29 04:41:30.624000 audit[4009]: AVC avc: denied { bpf } for pid=4009 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.624000 audit[4009]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff26b432f0 a2=28 a3=0 items=0 ppid=3392 pid=4009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:30.624000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 29 04:41:30.624000 audit[4009]: AVC avc: denied { bpf } for pid=4009 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.624000 audit[4009]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff26b43400 a2=28 a3=0 items=0 ppid=3392 pid=4009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:30.624000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 29 04:41:30.624000 audit[4009]: AVC avc: denied { bpf } for pid=4009 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.624000 audit[4009]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff26b433e0 a2=28 a3=0 items=0 ppid=3392 pid=4009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:30.624000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 29 04:41:30.624000 audit[4009]: AVC avc: denied { bpf } for pid=4009 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.624000 audit[4009]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff26b433d0 a2=28 a3=0 items=0 ppid=3392 pid=4009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:30.624000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 29 04:41:30.624000 audit[4009]: AVC avc: denied { bpf } for pid=4009 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.624000 audit[4009]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff26b43400 a2=28 a3=0 items=0 ppid=3392 pid=4009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:30.624000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 29 04:41:30.624000 audit[4009]: AVC avc: denied { bpf } for pid=4009 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.624000 audit[4009]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff26b433e0 a2=28 a3=0 items=0 ppid=3392 pid=4009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:30.624000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 29 04:41:30.624000 audit[4009]: AVC avc: denied { bpf } for pid=4009 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.624000 audit[4009]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff26b43400 a2=28 a3=0 items=0 ppid=3392 pid=4009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:30.624000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 29 04:41:30.624000 audit[4009]: AVC avc: denied { bpf } for pid=4009 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.624000 audit[4009]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff26b433d0 a2=28 a3=0 items=0 ppid=3392 pid=4009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:30.624000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 29 04:41:30.625000 audit[4009]: AVC avc: denied { bpf } for pid=4009 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.625000 audit[4009]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff26b43440 a2=28 a3=0 items=0 ppid=3392 pid=4009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:30.625000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 29 04:41:30.625000 audit[4009]: AVC avc: denied { perfmon } for pid=4009 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.625000 audit[4009]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff26b431f0 a2=50 a3=1 items=0 ppid=3392 pid=4009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:30.625000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 29 04:41:30.625000 audit[4009]: AVC avc: denied { bpf } for pid=4009 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.625000 audit[4009]: AVC avc: denied { bpf } for pid=4009 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.625000 audit[4009]: AVC avc: denied { perfmon } for pid=4009 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.625000 audit[4009]: AVC avc: denied { perfmon } for pid=4009 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.625000 audit[4009]: AVC avc: denied { perfmon } for pid=4009 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.625000 audit[4009]: AVC avc: denied { perfmon } for pid=4009 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.625000 audit[4009]: AVC avc: denied { perfmon } for pid=4009 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.625000 audit[4009]: AVC avc: denied { bpf } for pid=4009 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.625000 audit[4009]: AVC avc: denied { bpf } for pid=4009 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.625000 audit: BPF prog-id=184 op=LOAD Oct 29 04:41:30.625000 audit[4009]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff26b431f0 a2=94 a3=5 items=0 ppid=3392 pid=4009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:30.625000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 29 04:41:30.625000 audit: BPF prog-id=184 op=UNLOAD Oct 29 04:41:30.625000 audit[4009]: AVC avc: denied { perfmon } for pid=4009 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.625000 audit[4009]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff26b432a0 a2=50 a3=1 items=0 ppid=3392 pid=4009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:30.625000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 29 04:41:30.625000 audit[4009]: AVC avc: denied { bpf } for pid=4009 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.625000 audit[4009]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7fff26b433c0 a2=4 a3=38 items=0 ppid=3392 pid=4009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:30.625000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 29 04:41:30.625000 audit[4009]: AVC avc: denied { bpf } for pid=4009 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.625000 audit[4009]: AVC avc: denied { bpf } for pid=4009 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.625000 audit[4009]: AVC avc: denied { perfmon } for pid=4009 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.625000 audit[4009]: AVC avc: denied { bpf } for pid=4009 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.625000 audit[4009]: AVC avc: denied { perfmon } for pid=4009 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.625000 audit[4009]: AVC avc: denied { perfmon } for pid=4009 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.625000 audit[4009]: AVC avc: denied { perfmon } for pid=4009 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.625000 audit[4009]: AVC avc: denied { perfmon } for pid=4009 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.625000 audit[4009]: AVC avc: denied { perfmon } for pid=4009 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.625000 audit[4009]: AVC avc: denied { bpf } for pid=4009 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.625000 audit[4009]: AVC avc: denied { confidentiality } for pid=4009 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:41:30.625000 audit[4009]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff26b43410 a2=94 a3=6 items=0 ppid=3392 pid=4009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:30.625000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 29 04:41:30.626000 audit[4009]: AVC avc: denied { bpf } for pid=4009 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.626000 audit[4009]: AVC avc: denied { bpf } for pid=4009 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.626000 audit[4009]: AVC avc: denied { perfmon } for pid=4009 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.626000 audit[4009]: AVC avc: denied { bpf } for pid=4009 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.626000 audit[4009]: AVC avc: denied { perfmon } for pid=4009 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.626000 audit[4009]: AVC avc: denied { perfmon } for pid=4009 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.626000 audit[4009]: AVC avc: denied { perfmon } for pid=4009 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.626000 audit[4009]: AVC avc: denied { perfmon } for pid=4009 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.626000 audit[4009]: AVC avc: denied { perfmon } for pid=4009 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.626000 audit[4009]: AVC avc: denied { bpf } for pid=4009 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.626000 audit[4009]: AVC avc: denied { confidentiality } for pid=4009 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:41:30.626000 audit[4009]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff26b42bc0 a2=94 a3=88 items=0 ppid=3392 pid=4009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:30.626000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 29 04:41:30.626000 audit[4009]: AVC avc: denied { bpf } for pid=4009 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.626000 audit[4009]: AVC avc: denied { bpf } for pid=4009 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.626000 audit[4009]: AVC avc: denied { perfmon } for pid=4009 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.626000 audit[4009]: AVC avc: denied { bpf } for pid=4009 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.626000 audit[4009]: AVC avc: denied { perfmon } for pid=4009 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.626000 audit[4009]: AVC avc: denied { perfmon } for pid=4009 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.626000 audit[4009]: AVC avc: denied { perfmon } for pid=4009 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.626000 audit[4009]: AVC avc: denied { perfmon } for pid=4009 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.626000 audit[4009]: AVC avc: denied { perfmon } for pid=4009 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.626000 audit[4009]: AVC avc: denied { bpf } for pid=4009 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.626000 audit[4009]: AVC avc: denied { confidentiality } for pid=4009 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Oct 29 04:41:30.626000 audit[4009]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff26b42bc0 a2=94 a3=88 items=0 ppid=3392 pid=4009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:30.626000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 29 04:41:30.627000 audit[4009]: AVC avc: denied { bpf } for pid=4009 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.627000 audit[4009]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff26b445f0 a2=10 a3=f8f00800 items=0 ppid=3392 pid=4009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:30.627000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 29 04:41:30.627000 audit[4009]: AVC avc: denied { bpf } for pid=4009 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.627000 audit[4009]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff26b44490 a2=10 a3=3 items=0 ppid=3392 pid=4009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:30.627000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 29 04:41:30.627000 audit[4009]: AVC avc: denied { bpf } for pid=4009 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.627000 audit[4009]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff26b44430 a2=10 a3=3 items=0 ppid=3392 pid=4009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:30.627000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 29 04:41:30.627000 audit[4009]: AVC avc: denied { bpf } for pid=4009 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:30.627000 audit[4009]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff26b44430 a2=10 a3=7 items=0 ppid=3392 pid=4009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:30.627000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Oct 29 04:41:30.657000 audit: BPF prog-id=179 op=UNLOAD Oct 29 04:41:30.793000 audit[4037]: NETFILTER_CFG table=raw:107 family=2 entries=21 op=nft_register_chain pid=4037 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 29 04:41:30.793000 audit[4037]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffc7b2058f0 a2=0 a3=7ffc7b2058dc items=0 ppid=3392 pid=4037 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:30.793000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 29 04:41:30.797000 audit[4040]: NETFILTER_CFG table=mangle:108 family=2 entries=16 op=nft_register_chain pid=4040 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 29 04:41:30.797000 audit[4040]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7fffeaea2670 a2=0 a3=55c4fa6a3000 items=0 ppid=3392 pid=4040 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:30.797000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 29 04:41:30.800000 audit[4038]: NETFILTER_CFG table=nat:109 family=2 entries=15 op=nft_register_chain pid=4038 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 29 04:41:30.800000 audit[4038]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffc7da611b0 a2=0 a3=7ffc7da6119c items=0 ppid=3392 pid=4038 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:30.800000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 29 04:41:30.823971 kubelet[1975]: E1029 04:41:30.823907 1975 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found\"" pod="calico-system/goldmane-666569f655-w7zrh" podUID="4809fb25-1663-4bc2-b12f-599470e2bb91" Oct 29 04:41:30.824481 kubelet[1975]: E1029 04:41:30.824367 1975 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-kube-controllers\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found\"" pod="calico-system/calico-kube-controllers-76dd6544c7-psclk" podUID="7c4e2a15-2feb-448f-b8ed-a786076858ec" Oct 29 04:41:30.824961 kubelet[1975]: E1029 04:41:30.824813 1975 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found\"]" pod="calico-system/whisker-7fbcdbccd-mghcv" podUID="f101f74a-91c5-460d-8026-7c7655b6a631" Oct 29 04:41:30.849948 kubelet[1975]: I1029 04:41:30.849793 1975 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-668d6bf9bc-gdp2b" podStartSLOduration=56.846239243 podStartE2EDuration="56.846239243s" podCreationTimestamp="2025-10-29 04:40:34 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-10-29 04:41:29.838270247 +0000 UTC m=+61.003338189" watchObservedRunningTime="2025-10-29 04:41:30.846239243 +0000 UTC m=+62.011307181" Oct 29 04:41:30.818000 audit[4042]: NETFILTER_CFG table=filter:110 family=2 entries=226 op=nft_register_chain pid=4042 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 29 04:41:30.818000 audit[4042]: SYSCALL arch=c000003e syscall=46 success=yes exit=131252 a0=3 a1=7ffc0bb987e0 a2=0 a3=7ffc0bb987cc items=0 ppid=3392 pid=4042 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:30.818000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 29 04:41:30.879947 systemd-networkd[1018]: cali501e1a249b6: Gained IPv6LL Oct 29 04:41:30.939000 audit[4052]: NETFILTER_CFG table=filter:111 family=2 entries=20 op=nft_register_rule pid=4052 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 29 04:41:30.939000 audit[4052]: SYSCALL arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7ffdcd190b80 a2=0 a3=7ffdcd190b6c items=0 ppid=2117 pid=4052 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:30.939000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 29 04:41:30.944000 audit[4052]: NETFILTER_CFG table=nat:112 family=2 entries=14 op=nft_register_rule pid=4052 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 29 04:41:30.944000 audit[4052]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffdcd190b80 a2=0 a3=0 items=0 ppid=2117 pid=4052 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:30.944000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 29 04:41:30.963000 audit[4057]: NETFILTER_CFG table=filter:113 family=2 entries=17 op=nft_register_rule pid=4057 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 29 04:41:30.963000 audit[4057]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffd441642b0 a2=0 a3=7ffd4416429c items=0 ppid=2117 pid=4057 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:30.963000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 29 04:41:30.969000 audit[4057]: NETFILTER_CFG table=nat:114 family=2 entries=35 op=nft_register_chain pid=4057 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 29 04:41:30.969000 audit[4057]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffd441642b0 a2=0 a3=7ffd4416429c items=0 ppid=2117 pid=4057 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:30.969000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 29 04:41:32.416038 systemd-networkd[1018]: vxlan.calico: Gained IPv6LL Oct 29 04:41:33.248369 env[1204]: time="2025-10-29T04:41:33.246508502Z" level=info msg="StopPodSandbox for \"3a6531b7a71ead9ba41921822995cf180b9099b3f798fb351c5a7b17032b2dc8\"" Oct 29 04:41:33.420578 env[1204]: 2025-10-29 04:41:33.354 [INFO][4068] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="3a6531b7a71ead9ba41921822995cf180b9099b3f798fb351c5a7b17032b2dc8" Oct 29 04:41:33.420578 env[1204]: 2025-10-29 04:41:33.355 [INFO][4068] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="3a6531b7a71ead9ba41921822995cf180b9099b3f798fb351c5a7b17032b2dc8" iface="eth0" netns="/var/run/netns/cni-97c2ced9-73fe-1e6d-6ea2-778bfc1aac3c" Oct 29 04:41:33.420578 env[1204]: 2025-10-29 04:41:33.356 [INFO][4068] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="3a6531b7a71ead9ba41921822995cf180b9099b3f798fb351c5a7b17032b2dc8" iface="eth0" netns="/var/run/netns/cni-97c2ced9-73fe-1e6d-6ea2-778bfc1aac3c" Oct 29 04:41:33.420578 env[1204]: 2025-10-29 04:41:33.356 [INFO][4068] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="3a6531b7a71ead9ba41921822995cf180b9099b3f798fb351c5a7b17032b2dc8" iface="eth0" netns="/var/run/netns/cni-97c2ced9-73fe-1e6d-6ea2-778bfc1aac3c" Oct 29 04:41:33.420578 env[1204]: 2025-10-29 04:41:33.356 [INFO][4068] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="3a6531b7a71ead9ba41921822995cf180b9099b3f798fb351c5a7b17032b2dc8" Oct 29 04:41:33.420578 env[1204]: 2025-10-29 04:41:33.356 [INFO][4068] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="3a6531b7a71ead9ba41921822995cf180b9099b3f798fb351c5a7b17032b2dc8" Oct 29 04:41:33.420578 env[1204]: 2025-10-29 04:41:33.401 [INFO][4075] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="3a6531b7a71ead9ba41921822995cf180b9099b3f798fb351c5a7b17032b2dc8" HandleID="k8s-pod-network.3a6531b7a71ead9ba41921822995cf180b9099b3f798fb351c5a7b17032b2dc8" Workload="srv--jtkau.gb1.brightbox.com-k8s-coredns--668d6bf9bc--5zwgd-eth0" Oct 29 04:41:33.420578 env[1204]: 2025-10-29 04:41:33.401 [INFO][4075] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 29 04:41:33.420578 env[1204]: 2025-10-29 04:41:33.401 [INFO][4075] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 29 04:41:33.420578 env[1204]: 2025-10-29 04:41:33.413 [WARNING][4075] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="3a6531b7a71ead9ba41921822995cf180b9099b3f798fb351c5a7b17032b2dc8" HandleID="k8s-pod-network.3a6531b7a71ead9ba41921822995cf180b9099b3f798fb351c5a7b17032b2dc8" Workload="srv--jtkau.gb1.brightbox.com-k8s-coredns--668d6bf9bc--5zwgd-eth0" Oct 29 04:41:33.420578 env[1204]: 2025-10-29 04:41:33.413 [INFO][4075] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="3a6531b7a71ead9ba41921822995cf180b9099b3f798fb351c5a7b17032b2dc8" HandleID="k8s-pod-network.3a6531b7a71ead9ba41921822995cf180b9099b3f798fb351c5a7b17032b2dc8" Workload="srv--jtkau.gb1.brightbox.com-k8s-coredns--668d6bf9bc--5zwgd-eth0" Oct 29 04:41:33.420578 env[1204]: 2025-10-29 04:41:33.415 [INFO][4075] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 29 04:41:33.420578 env[1204]: 2025-10-29 04:41:33.417 [INFO][4068] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="3a6531b7a71ead9ba41921822995cf180b9099b3f798fb351c5a7b17032b2dc8" Oct 29 04:41:33.426930 env[1204]: time="2025-10-29T04:41:33.426868217Z" level=info msg="TearDown network for sandbox \"3a6531b7a71ead9ba41921822995cf180b9099b3f798fb351c5a7b17032b2dc8\" successfully" Oct 29 04:41:33.427119 env[1204]: time="2025-10-29T04:41:33.427085523Z" level=info msg="StopPodSandbox for \"3a6531b7a71ead9ba41921822995cf180b9099b3f798fb351c5a7b17032b2dc8\" returns successfully" Oct 29 04:41:33.427824 systemd[1]: run-netns-cni\x2d97c2ced9\x2d73fe\x2d1e6d\x2d6ea2\x2d778bfc1aac3c.mount: Deactivated successfully. Oct 29 04:41:33.431028 env[1204]: time="2025-10-29T04:41:33.430965607Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-5zwgd,Uid:68d50d2a-6df7-4b3f-936e-efecabf2c6a8,Namespace:kube-system,Attempt:1,}" Oct 29 04:41:33.616854 systemd-networkd[1018]: cali61f9160160c: Link UP Oct 29 04:41:33.618984 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Oct 29 04:41:33.619083 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali61f9160160c: link becomes ready Oct 29 04:41:33.620954 systemd-networkd[1018]: cali61f9160160c: Gained carrier Oct 29 04:41:33.646354 env[1204]: 2025-10-29 04:41:33.496 [INFO][4081] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {srv--jtkau.gb1.brightbox.com-k8s-coredns--668d6bf9bc--5zwgd-eth0 coredns-668d6bf9bc- kube-system 68d50d2a-6df7-4b3f-936e-efecabf2c6a8 1022 0 2025-10-29 04:40:34 +0000 UTC map[k8s-app:kube-dns pod-template-hash:668d6bf9bc projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s srv-jtkau.gb1.brightbox.com coredns-668d6bf9bc-5zwgd eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali61f9160160c [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] [] }} ContainerID="109f89c8158b8299c1eca745731c95c5a244320c2617071e91e8f5dfca32d517" Namespace="kube-system" Pod="coredns-668d6bf9bc-5zwgd" WorkloadEndpoint="srv--jtkau.gb1.brightbox.com-k8s-coredns--668d6bf9bc--5zwgd-" Oct 29 04:41:33.646354 env[1204]: 2025-10-29 04:41:33.497 [INFO][4081] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="109f89c8158b8299c1eca745731c95c5a244320c2617071e91e8f5dfca32d517" Namespace="kube-system" Pod="coredns-668d6bf9bc-5zwgd" WorkloadEndpoint="srv--jtkau.gb1.brightbox.com-k8s-coredns--668d6bf9bc--5zwgd-eth0" Oct 29 04:41:33.646354 env[1204]: 2025-10-29 04:41:33.545 [INFO][4095] ipam/ipam_plugin.go 227: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="109f89c8158b8299c1eca745731c95c5a244320c2617071e91e8f5dfca32d517" HandleID="k8s-pod-network.109f89c8158b8299c1eca745731c95c5a244320c2617071e91e8f5dfca32d517" Workload="srv--jtkau.gb1.brightbox.com-k8s-coredns--668d6bf9bc--5zwgd-eth0" Oct 29 04:41:33.646354 env[1204]: 2025-10-29 04:41:33.545 [INFO][4095] ipam/ipam_plugin.go 275: Auto assigning IP ContainerID="109f89c8158b8299c1eca745731c95c5a244320c2617071e91e8f5dfca32d517" HandleID="k8s-pod-network.109f89c8158b8299c1eca745731c95c5a244320c2617071e91e8f5dfca32d517" Workload="srv--jtkau.gb1.brightbox.com-k8s-coredns--668d6bf9bc--5zwgd-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002d5930), Attrs:map[string]string{"namespace":"kube-system", "node":"srv-jtkau.gb1.brightbox.com", "pod":"coredns-668d6bf9bc-5zwgd", "timestamp":"2025-10-29 04:41:33.545464118 +0000 UTC"}, Hostname:"srv-jtkau.gb1.brightbox.com", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 29 04:41:33.646354 env[1204]: 2025-10-29 04:41:33.545 [INFO][4095] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 29 04:41:33.646354 env[1204]: 2025-10-29 04:41:33.545 [INFO][4095] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 29 04:41:33.646354 env[1204]: 2025-10-29 04:41:33.546 [INFO][4095] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'srv-jtkau.gb1.brightbox.com' Oct 29 04:41:33.646354 env[1204]: 2025-10-29 04:41:33.558 [INFO][4095] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.109f89c8158b8299c1eca745731c95c5a244320c2617071e91e8f5dfca32d517" host="srv-jtkau.gb1.brightbox.com" Oct 29 04:41:33.646354 env[1204]: 2025-10-29 04:41:33.567 [INFO][4095] ipam/ipam.go 394: Looking up existing affinities for host host="srv-jtkau.gb1.brightbox.com" Oct 29 04:41:33.646354 env[1204]: 2025-10-29 04:41:33.574 [INFO][4095] ipam/ipam.go 511: Trying affinity for 192.168.110.192/26 host="srv-jtkau.gb1.brightbox.com" Oct 29 04:41:33.646354 env[1204]: 2025-10-29 04:41:33.578 [INFO][4095] ipam/ipam.go 158: Attempting to load block cidr=192.168.110.192/26 host="srv-jtkau.gb1.brightbox.com" Oct 29 04:41:33.646354 env[1204]: 2025-10-29 04:41:33.582 [INFO][4095] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.110.192/26 host="srv-jtkau.gb1.brightbox.com" Oct 29 04:41:33.646354 env[1204]: 2025-10-29 04:41:33.582 [INFO][4095] ipam/ipam.go 1219: Attempting to assign 1 addresses from block block=192.168.110.192/26 handle="k8s-pod-network.109f89c8158b8299c1eca745731c95c5a244320c2617071e91e8f5dfca32d517" host="srv-jtkau.gb1.brightbox.com" Oct 29 04:41:33.646354 env[1204]: 2025-10-29 04:41:33.584 [INFO][4095] ipam/ipam.go 1780: Creating new handle: k8s-pod-network.109f89c8158b8299c1eca745731c95c5a244320c2617071e91e8f5dfca32d517 Oct 29 04:41:33.646354 env[1204]: 2025-10-29 04:41:33.592 [INFO][4095] ipam/ipam.go 1246: Writing block in order to claim IPs block=192.168.110.192/26 handle="k8s-pod-network.109f89c8158b8299c1eca745731c95c5a244320c2617071e91e8f5dfca32d517" host="srv-jtkau.gb1.brightbox.com" Oct 29 04:41:33.646354 env[1204]: 2025-10-29 04:41:33.602 [INFO][4095] ipam/ipam.go 1262: Successfully claimed IPs: [192.168.110.198/26] block=192.168.110.192/26 handle="k8s-pod-network.109f89c8158b8299c1eca745731c95c5a244320c2617071e91e8f5dfca32d517" host="srv-jtkau.gb1.brightbox.com" Oct 29 04:41:33.646354 env[1204]: 2025-10-29 04:41:33.602 [INFO][4095] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.110.198/26] handle="k8s-pod-network.109f89c8158b8299c1eca745731c95c5a244320c2617071e91e8f5dfca32d517" host="srv-jtkau.gb1.brightbox.com" Oct 29 04:41:33.646354 env[1204]: 2025-10-29 04:41:33.602 [INFO][4095] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 29 04:41:33.646354 env[1204]: 2025-10-29 04:41:33.602 [INFO][4095] ipam/ipam_plugin.go 299: Calico CNI IPAM assigned addresses IPv4=[192.168.110.198/26] IPv6=[] ContainerID="109f89c8158b8299c1eca745731c95c5a244320c2617071e91e8f5dfca32d517" HandleID="k8s-pod-network.109f89c8158b8299c1eca745731c95c5a244320c2617071e91e8f5dfca32d517" Workload="srv--jtkau.gb1.brightbox.com-k8s-coredns--668d6bf9bc--5zwgd-eth0" Oct 29 04:41:33.647852 env[1204]: 2025-10-29 04:41:33.605 [INFO][4081] cni-plugin/k8s.go 418: Populated endpoint ContainerID="109f89c8158b8299c1eca745731c95c5a244320c2617071e91e8f5dfca32d517" Namespace="kube-system" Pod="coredns-668d6bf9bc-5zwgd" WorkloadEndpoint="srv--jtkau.gb1.brightbox.com-k8s-coredns--668d6bf9bc--5zwgd-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--jtkau.gb1.brightbox.com-k8s-coredns--668d6bf9bc--5zwgd-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"68d50d2a-6df7-4b3f-936e-efecabf2c6a8", ResourceVersion:"1022", Generation:0, CreationTimestamp:time.Date(2025, time.October, 29, 4, 40, 34, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-jtkau.gb1.brightbox.com", ContainerID:"", Pod:"coredns-668d6bf9bc-5zwgd", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.110.198/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali61f9160160c", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 29 04:41:33.647852 env[1204]: 2025-10-29 04:41:33.605 [INFO][4081] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.110.198/32] ContainerID="109f89c8158b8299c1eca745731c95c5a244320c2617071e91e8f5dfca32d517" Namespace="kube-system" Pod="coredns-668d6bf9bc-5zwgd" WorkloadEndpoint="srv--jtkau.gb1.brightbox.com-k8s-coredns--668d6bf9bc--5zwgd-eth0" Oct 29 04:41:33.647852 env[1204]: 2025-10-29 04:41:33.605 [INFO][4081] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali61f9160160c ContainerID="109f89c8158b8299c1eca745731c95c5a244320c2617071e91e8f5dfca32d517" Namespace="kube-system" Pod="coredns-668d6bf9bc-5zwgd" WorkloadEndpoint="srv--jtkau.gb1.brightbox.com-k8s-coredns--668d6bf9bc--5zwgd-eth0" Oct 29 04:41:33.647852 env[1204]: 2025-10-29 04:41:33.622 [INFO][4081] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="109f89c8158b8299c1eca745731c95c5a244320c2617071e91e8f5dfca32d517" Namespace="kube-system" Pod="coredns-668d6bf9bc-5zwgd" WorkloadEndpoint="srv--jtkau.gb1.brightbox.com-k8s-coredns--668d6bf9bc--5zwgd-eth0" Oct 29 04:41:33.647852 env[1204]: 2025-10-29 04:41:33.622 [INFO][4081] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="109f89c8158b8299c1eca745731c95c5a244320c2617071e91e8f5dfca32d517" Namespace="kube-system" Pod="coredns-668d6bf9bc-5zwgd" WorkloadEndpoint="srv--jtkau.gb1.brightbox.com-k8s-coredns--668d6bf9bc--5zwgd-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--jtkau.gb1.brightbox.com-k8s-coredns--668d6bf9bc--5zwgd-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"68d50d2a-6df7-4b3f-936e-efecabf2c6a8", ResourceVersion:"1022", Generation:0, CreationTimestamp:time.Date(2025, time.October, 29, 4, 40, 34, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-jtkau.gb1.brightbox.com", ContainerID:"109f89c8158b8299c1eca745731c95c5a244320c2617071e91e8f5dfca32d517", Pod:"coredns-668d6bf9bc-5zwgd", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.110.198/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali61f9160160c", MAC:"82:af:2a:ae:d4:f6", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 29 04:41:33.647852 env[1204]: 2025-10-29 04:41:33.641 [INFO][4081] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="109f89c8158b8299c1eca745731c95c5a244320c2617071e91e8f5dfca32d517" Namespace="kube-system" Pod="coredns-668d6bf9bc-5zwgd" WorkloadEndpoint="srv--jtkau.gb1.brightbox.com-k8s-coredns--668d6bf9bc--5zwgd-eth0" Oct 29 04:41:33.668839 env[1204]: time="2025-10-29T04:41:33.668723639Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 29 04:41:33.669184 env[1204]: time="2025-10-29T04:41:33.669090294Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 29 04:41:33.669479 env[1204]: time="2025-10-29T04:41:33.669424602Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 29 04:41:33.671995 env[1204]: time="2025-10-29T04:41:33.671869240Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/109f89c8158b8299c1eca745731c95c5a244320c2617071e91e8f5dfca32d517 pid=4121 runtime=io.containerd.runc.v2 Oct 29 04:41:33.707000 audit[4133]: NETFILTER_CFG table=filter:115 family=2 entries=50 op=nft_register_chain pid=4133 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 29 04:41:33.712746 kernel: kauditd_printk_skb: 830 callbacks suppressed Oct 29 04:41:33.712903 kernel: audit: type=1325 audit(1761712893.707:1264): table=filter:115 family=2 entries=50 op=nft_register_chain pid=4133 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 29 04:41:33.707000 audit[4133]: SYSCALL arch=c000003e syscall=46 success=yes exit=24368 a0=3 a1=7ffdb92b1600 a2=0 a3=7ffdb92b15ec items=0 ppid=3392 pid=4133 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:33.723849 kernel: audit: type=1300 audit(1761712893.707:1264): arch=c000003e syscall=46 success=yes exit=24368 a0=3 a1=7ffdb92b1600 a2=0 a3=7ffdb92b15ec items=0 ppid=3392 pid=4133 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:33.731812 systemd[1]: Started cri-containerd-109f89c8158b8299c1eca745731c95c5a244320c2617071e91e8f5dfca32d517.scope. Oct 29 04:41:33.707000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 29 04:41:33.749863 kernel: audit: type=1327 audit(1761712893.707:1264): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 29 04:41:33.781000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:33.782000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:33.793807 kernel: audit: type=1400 audit(1761712893.781:1265): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:33.799025 kernel: audit: type=1400 audit(1761712893.782:1266): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:33.799127 kernel: audit: type=1400 audit(1761712893.782:1267): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:33.782000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:33.782000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:33.805730 kernel: audit: type=1400 audit(1761712893.782:1268): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:33.782000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:33.812658 kernel: audit: type=1400 audit(1761712893.782:1269): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:33.782000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:33.782000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:33.822925 kernel: audit: type=1400 audit(1761712893.782:1270): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:33.823008 kernel: audit: type=1400 audit(1761712893.782:1271): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:33.782000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:33.782000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:33.782000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:33.782000 audit: BPF prog-id=185 op=LOAD Oct 29 04:41:33.783000 audit[4132]: AVC avc: denied { bpf } for pid=4132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:33.783000 audit[4132]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=4121 pid=4132 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:33.783000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130396638396338313538623832393963316563613734353733316339 Oct 29 04:41:33.783000 audit[4132]: AVC avc: denied { perfmon } for pid=4132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:33.783000 audit[4132]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=4121 pid=4132 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:33.783000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130396638396338313538623832393963316563613734353733316339 Oct 29 04:41:33.783000 audit[4132]: AVC avc: denied { bpf } for pid=4132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:33.783000 audit[4132]: AVC avc: denied { bpf } for pid=4132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:33.783000 audit[4132]: AVC avc: denied { bpf } for pid=4132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:33.783000 audit[4132]: AVC avc: denied { perfmon } for pid=4132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:33.783000 audit[4132]: AVC avc: denied { perfmon } for pid=4132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:33.783000 audit[4132]: AVC avc: denied { perfmon } for pid=4132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:33.783000 audit[4132]: AVC avc: denied { perfmon } for pid=4132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:33.783000 audit[4132]: AVC avc: denied { perfmon } for pid=4132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:33.783000 audit[4132]: AVC avc: denied { bpf } for pid=4132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:33.783000 audit[4132]: AVC avc: denied { bpf } for pid=4132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:33.783000 audit: BPF prog-id=186 op=LOAD Oct 29 04:41:33.783000 audit[4132]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0003bc530 items=0 ppid=4121 pid=4132 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:33.783000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130396638396338313538623832393963316563613734353733316339 Oct 29 04:41:33.797000 audit[4132]: AVC avc: denied { bpf } for pid=4132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:33.797000 audit[4132]: AVC avc: denied { bpf } for pid=4132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:33.797000 audit[4132]: AVC avc: denied { perfmon } for pid=4132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:33.797000 audit[4132]: AVC avc: denied { perfmon } for pid=4132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:33.797000 audit[4132]: AVC avc: denied { perfmon } for pid=4132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:33.797000 audit[4132]: AVC avc: denied { perfmon } for pid=4132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:33.797000 audit[4132]: AVC avc: denied { perfmon } for pid=4132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:33.797000 audit[4132]: AVC avc: denied { bpf } for pid=4132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:33.797000 audit[4132]: AVC avc: denied { bpf } for pid=4132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:33.797000 audit: BPF prog-id=187 op=LOAD Oct 29 04:41:33.797000 audit[4132]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0003bc578 items=0 ppid=4121 pid=4132 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:33.797000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130396638396338313538623832393963316563613734353733316339 Oct 29 04:41:33.797000 audit: BPF prog-id=187 op=UNLOAD Oct 29 04:41:33.798000 audit: BPF prog-id=186 op=UNLOAD Oct 29 04:41:33.798000 audit[4132]: AVC avc: denied { bpf } for pid=4132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:33.798000 audit[4132]: AVC avc: denied { bpf } for pid=4132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:33.798000 audit[4132]: AVC avc: denied { bpf } for pid=4132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:33.798000 audit[4132]: AVC avc: denied { perfmon } for pid=4132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:33.798000 audit[4132]: AVC avc: denied { perfmon } for pid=4132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:33.798000 audit[4132]: AVC avc: denied { perfmon } for pid=4132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:33.798000 audit[4132]: AVC avc: denied { perfmon } for pid=4132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:33.798000 audit[4132]: AVC avc: denied { perfmon } for pid=4132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:33.798000 audit[4132]: AVC avc: denied { bpf } for pid=4132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:33.798000 audit[4132]: AVC avc: denied { bpf } for pid=4132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:33.798000 audit: BPF prog-id=188 op=LOAD Oct 29 04:41:33.798000 audit[4132]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003bc988 items=0 ppid=4121 pid=4132 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:33.798000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130396638396338313538623832393963316563613734353733316339 Oct 29 04:41:33.896965 env[1204]: time="2025-10-29T04:41:33.896842570Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-5zwgd,Uid:68d50d2a-6df7-4b3f-936e-efecabf2c6a8,Namespace:kube-system,Attempt:1,} returns sandbox id \"109f89c8158b8299c1eca745731c95c5a244320c2617071e91e8f5dfca32d517\"" Oct 29 04:41:33.902821 env[1204]: time="2025-10-29T04:41:33.902766163Z" level=info msg="CreateContainer within sandbox \"109f89c8158b8299c1eca745731c95c5a244320c2617071e91e8f5dfca32d517\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Oct 29 04:41:33.923307 env[1204]: time="2025-10-29T04:41:33.923222269Z" level=info msg="CreateContainer within sandbox \"109f89c8158b8299c1eca745731c95c5a244320c2617071e91e8f5dfca32d517\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"b46d7fbc22af99b5efdc81e000889bb2fe6da845d5c7c03c728864543dec7534\"" Oct 29 04:41:33.924173 env[1204]: time="2025-10-29T04:41:33.924125486Z" level=info msg="StartContainer for \"b46d7fbc22af99b5efdc81e000889bb2fe6da845d5c7c03c728864543dec7534\"" Oct 29 04:41:33.981739 systemd[1]: Started cri-containerd-b46d7fbc22af99b5efdc81e000889bb2fe6da845d5c7c03c728864543dec7534.scope. Oct 29 04:41:34.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:34.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:34.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:34.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:34.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:34.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:34.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:34.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:34.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:34.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:34.022000 audit: BPF prog-id=189 op=LOAD Oct 29 04:41:34.024000 audit[4162]: AVC avc: denied { bpf } for pid=4162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:34.024000 audit[4162]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=4121 pid=4162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:34.024000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234366437666263323261663939623565666463383165303030383839 Oct 29 04:41:34.024000 audit[4162]: AVC avc: denied { perfmon } for pid=4162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:34.024000 audit[4162]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=4121 pid=4162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:34.024000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234366437666263323261663939623565666463383165303030383839 Oct 29 04:41:34.024000 audit[4162]: AVC avc: denied { bpf } for pid=4162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:34.024000 audit[4162]: AVC avc: denied { bpf } for pid=4162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:34.024000 audit[4162]: AVC avc: denied { bpf } for pid=4162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:34.024000 audit[4162]: AVC avc: denied { perfmon } for pid=4162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:34.024000 audit[4162]: AVC avc: denied { perfmon } for pid=4162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:34.024000 audit[4162]: AVC avc: denied { perfmon } for pid=4162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:34.024000 audit[4162]: AVC avc: denied { perfmon } for pid=4162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:34.024000 audit[4162]: AVC avc: denied { perfmon } for pid=4162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:34.024000 audit[4162]: AVC avc: denied { bpf } for pid=4162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:34.024000 audit[4162]: AVC avc: denied { bpf } for pid=4162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:34.024000 audit: BPF prog-id=190 op=LOAD Oct 29 04:41:34.024000 audit[4162]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c000193820 items=0 ppid=4121 pid=4162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:34.024000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234366437666263323261663939623565666463383165303030383839 Oct 29 04:41:34.026000 audit[4162]: AVC avc: denied { bpf } for pid=4162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:34.026000 audit[4162]: AVC avc: denied { bpf } for pid=4162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:34.026000 audit[4162]: AVC avc: denied { perfmon } for pid=4162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:34.026000 audit[4162]: AVC avc: denied { perfmon } for pid=4162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:34.026000 audit[4162]: AVC avc: denied { perfmon } for pid=4162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:34.026000 audit[4162]: AVC avc: denied { perfmon } for pid=4162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:34.026000 audit[4162]: AVC avc: denied { perfmon } for pid=4162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:34.026000 audit[4162]: AVC avc: denied { bpf } for pid=4162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:34.026000 audit[4162]: AVC avc: denied { bpf } for pid=4162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:34.026000 audit: BPF prog-id=191 op=LOAD Oct 29 04:41:34.026000 audit[4162]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c000193868 items=0 ppid=4121 pid=4162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:34.026000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234366437666263323261663939623565666463383165303030383839 Oct 29 04:41:34.026000 audit: BPF prog-id=191 op=UNLOAD Oct 29 04:41:34.027000 audit: BPF prog-id=190 op=UNLOAD Oct 29 04:41:34.027000 audit[4162]: AVC avc: denied { bpf } for pid=4162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:34.027000 audit[4162]: AVC avc: denied { bpf } for pid=4162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:34.027000 audit[4162]: AVC avc: denied { bpf } for pid=4162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:34.027000 audit[4162]: AVC avc: denied { perfmon } for pid=4162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:34.027000 audit[4162]: AVC avc: denied { perfmon } for pid=4162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:34.027000 audit[4162]: AVC avc: denied { perfmon } for pid=4162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:34.027000 audit[4162]: AVC avc: denied { perfmon } for pid=4162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:34.027000 audit[4162]: AVC avc: denied { perfmon } for pid=4162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:34.027000 audit[4162]: AVC avc: denied { bpf } for pid=4162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:34.027000 audit[4162]: AVC avc: denied { bpf } for pid=4162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:34.027000 audit: BPF prog-id=192 op=LOAD Oct 29 04:41:34.027000 audit[4162]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c000193c78 items=0 ppid=4121 pid=4162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:34.027000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234366437666263323261663939623565666463383165303030383839 Oct 29 04:41:34.059397 env[1204]: time="2025-10-29T04:41:34.059332842Z" level=info msg="StartContainer for \"b46d7fbc22af99b5efdc81e000889bb2fe6da845d5c7c03c728864543dec7534\" returns successfully" Oct 29 04:41:34.096000 audit[4173]: AVC avc: denied { getattr } for pid=4173 comm="coredns" path="cgroup:[4026532612]" dev="nsfs" ino=4026532612 scontext=system_u:system_r:svirt_lxc_net_t:s0:c672,c933 tcontext=system_u:object_r:nsfs_t:s0 tclass=file permissive=0 Oct 29 04:41:34.096000 audit[4173]: SYSCALL arch=c000003e syscall=262 success=no exit=-13 a0=ffffffffffffff9c a1=c00005aa38 a2=c0000c4c68 a3=0 items=0 ppid=4121 pid=4173 auid=4294967295 uid=65532 gid=65532 euid=65532 suid=65532 fsuid=65532 egid=65532 sgid=65532 fsgid=65532 tty=(none) ses=4294967295 comm="coredns" exe="/coredns" subj=system_u:system_r:svirt_lxc_net_t:s0:c672,c933 key=(null) Oct 29 04:41:34.096000 audit: PROCTITLE proctitle=2F636F7265646E73002D636F6E66002F6574632F636F7265646E732F436F726566696C65 Oct 29 04:41:34.863565 kubelet[1975]: I1029 04:41:34.863398 1975 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-668d6bf9bc-5zwgd" podStartSLOduration=60.863358295 podStartE2EDuration="1m0.863358295s" podCreationTimestamp="2025-10-29 04:40:34 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-10-29 04:41:34.860576375 +0000 UTC m=+66.025644305" watchObservedRunningTime="2025-10-29 04:41:34.863358295 +0000 UTC m=+66.028426233" Oct 29 04:41:34.888000 audit[4192]: NETFILTER_CFG table=filter:116 family=2 entries=14 op=nft_register_rule pid=4192 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 29 04:41:34.888000 audit[4192]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffd24ba4c50 a2=0 a3=7ffd24ba4c3c items=0 ppid=2117 pid=4192 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:34.888000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 29 04:41:34.897000 audit[4192]: NETFILTER_CFG table=nat:117 family=2 entries=44 op=nft_register_rule pid=4192 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 29 04:41:34.897000 audit[4192]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffd24ba4c50 a2=0 a3=7ffd24ba4c3c items=0 ppid=2117 pid=4192 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:34.897000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 29 04:41:34.934000 audit[4194]: NETFILTER_CFG table=filter:118 family=2 entries=14 op=nft_register_rule pid=4194 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 29 04:41:34.934000 audit[4194]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7fffa1fed400 a2=0 a3=7fffa1fed3ec items=0 ppid=2117 pid=4194 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:34.934000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 29 04:41:34.948000 audit[4194]: NETFILTER_CFG table=nat:119 family=2 entries=56 op=nft_register_chain pid=4194 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 29 04:41:34.948000 audit[4194]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7fffa1fed400 a2=0 a3=7fffa1fed3ec items=0 ppid=2117 pid=4194 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:34.948000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 29 04:41:35.232225 systemd-networkd[1018]: cali61f9160160c: Gained IPv6LL Oct 29 04:41:37.249969 env[1204]: time="2025-10-29T04:41:37.249887095Z" level=info msg="StopPodSandbox for \"818044961d5e8b93ed26f933b4aeb46a7e4f17d66029e564ee97f0fbc4f7b009\"" Oct 29 04:41:37.458044 env[1204]: 2025-10-29 04:41:37.380 [INFO][4213] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="818044961d5e8b93ed26f933b4aeb46a7e4f17d66029e564ee97f0fbc4f7b009" Oct 29 04:41:37.458044 env[1204]: 2025-10-29 04:41:37.381 [INFO][4213] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="818044961d5e8b93ed26f933b4aeb46a7e4f17d66029e564ee97f0fbc4f7b009" iface="eth0" netns="/var/run/netns/cni-f29cb813-70ee-c6e3-b4a0-bfc62cc960fe" Oct 29 04:41:37.458044 env[1204]: 2025-10-29 04:41:37.381 [INFO][4213] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="818044961d5e8b93ed26f933b4aeb46a7e4f17d66029e564ee97f0fbc4f7b009" iface="eth0" netns="/var/run/netns/cni-f29cb813-70ee-c6e3-b4a0-bfc62cc960fe" Oct 29 04:41:37.458044 env[1204]: 2025-10-29 04:41:37.385 [INFO][4213] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="818044961d5e8b93ed26f933b4aeb46a7e4f17d66029e564ee97f0fbc4f7b009" iface="eth0" netns="/var/run/netns/cni-f29cb813-70ee-c6e3-b4a0-bfc62cc960fe" Oct 29 04:41:37.458044 env[1204]: 2025-10-29 04:41:37.385 [INFO][4213] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="818044961d5e8b93ed26f933b4aeb46a7e4f17d66029e564ee97f0fbc4f7b009" Oct 29 04:41:37.458044 env[1204]: 2025-10-29 04:41:37.385 [INFO][4213] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="818044961d5e8b93ed26f933b4aeb46a7e4f17d66029e564ee97f0fbc4f7b009" Oct 29 04:41:37.458044 env[1204]: 2025-10-29 04:41:37.435 [INFO][4220] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="818044961d5e8b93ed26f933b4aeb46a7e4f17d66029e564ee97f0fbc4f7b009" HandleID="k8s-pod-network.818044961d5e8b93ed26f933b4aeb46a7e4f17d66029e564ee97f0fbc4f7b009" Workload="srv--jtkau.gb1.brightbox.com-k8s-calico--apiserver--66b476d74--xnzfh-eth0" Oct 29 04:41:37.458044 env[1204]: 2025-10-29 04:41:37.435 [INFO][4220] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 29 04:41:37.458044 env[1204]: 2025-10-29 04:41:37.436 [INFO][4220] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 29 04:41:37.458044 env[1204]: 2025-10-29 04:41:37.448 [WARNING][4220] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="818044961d5e8b93ed26f933b4aeb46a7e4f17d66029e564ee97f0fbc4f7b009" HandleID="k8s-pod-network.818044961d5e8b93ed26f933b4aeb46a7e4f17d66029e564ee97f0fbc4f7b009" Workload="srv--jtkau.gb1.brightbox.com-k8s-calico--apiserver--66b476d74--xnzfh-eth0" Oct 29 04:41:37.458044 env[1204]: 2025-10-29 04:41:37.448 [INFO][4220] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="818044961d5e8b93ed26f933b4aeb46a7e4f17d66029e564ee97f0fbc4f7b009" HandleID="k8s-pod-network.818044961d5e8b93ed26f933b4aeb46a7e4f17d66029e564ee97f0fbc4f7b009" Workload="srv--jtkau.gb1.brightbox.com-k8s-calico--apiserver--66b476d74--xnzfh-eth0" Oct 29 04:41:37.458044 env[1204]: 2025-10-29 04:41:37.452 [INFO][4220] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 29 04:41:37.458044 env[1204]: 2025-10-29 04:41:37.455 [INFO][4213] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="818044961d5e8b93ed26f933b4aeb46a7e4f17d66029e564ee97f0fbc4f7b009" Oct 29 04:41:37.463408 systemd[1]: run-netns-cni\x2df29cb813\x2d70ee\x2dc6e3\x2db4a0\x2dbfc62cc960fe.mount: Deactivated successfully. Oct 29 04:41:37.465385 env[1204]: time="2025-10-29T04:41:37.465291983Z" level=info msg="TearDown network for sandbox \"818044961d5e8b93ed26f933b4aeb46a7e4f17d66029e564ee97f0fbc4f7b009\" successfully" Oct 29 04:41:37.465514 env[1204]: time="2025-10-29T04:41:37.465403341Z" level=info msg="StopPodSandbox for \"818044961d5e8b93ed26f933b4aeb46a7e4f17d66029e564ee97f0fbc4f7b009\" returns successfully" Oct 29 04:41:37.466678 env[1204]: time="2025-10-29T04:41:37.466638435Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-66b476d74-xnzfh,Uid:9af229d2-d1e1-477e-9280-265e378cba4b,Namespace:calico-apiserver,Attempt:1,}" Oct 29 04:41:37.677493 systemd-networkd[1018]: cali21bbec9fe5c: Link UP Oct 29 04:41:37.691855 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Oct 29 04:41:37.692026 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali21bbec9fe5c: link becomes ready Oct 29 04:41:37.692360 systemd-networkd[1018]: cali21bbec9fe5c: Gained carrier Oct 29 04:41:37.723173 env[1204]: 2025-10-29 04:41:37.555 [INFO][4227] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {srv--jtkau.gb1.brightbox.com-k8s-calico--apiserver--66b476d74--xnzfh-eth0 calico-apiserver-66b476d74- calico-apiserver 9af229d2-d1e1-477e-9280-265e378cba4b 1050 0 2025-10-29 04:40:47 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:66b476d74 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s srv-jtkau.gb1.brightbox.com calico-apiserver-66b476d74-xnzfh eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali21bbec9fe5c [] [] }} ContainerID="9457e3ff8c4289d1e10d69786716385759af5971be3536c9639186102edd06a7" Namespace="calico-apiserver" Pod="calico-apiserver-66b476d74-xnzfh" WorkloadEndpoint="srv--jtkau.gb1.brightbox.com-k8s-calico--apiserver--66b476d74--xnzfh-" Oct 29 04:41:37.723173 env[1204]: 2025-10-29 04:41:37.555 [INFO][4227] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="9457e3ff8c4289d1e10d69786716385759af5971be3536c9639186102edd06a7" Namespace="calico-apiserver" Pod="calico-apiserver-66b476d74-xnzfh" WorkloadEndpoint="srv--jtkau.gb1.brightbox.com-k8s-calico--apiserver--66b476d74--xnzfh-eth0" Oct 29 04:41:37.723173 env[1204]: 2025-10-29 04:41:37.601 [INFO][4241] ipam/ipam_plugin.go 227: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="9457e3ff8c4289d1e10d69786716385759af5971be3536c9639186102edd06a7" HandleID="k8s-pod-network.9457e3ff8c4289d1e10d69786716385759af5971be3536c9639186102edd06a7" Workload="srv--jtkau.gb1.brightbox.com-k8s-calico--apiserver--66b476d74--xnzfh-eth0" Oct 29 04:41:37.723173 env[1204]: 2025-10-29 04:41:37.602 [INFO][4241] ipam/ipam_plugin.go 275: Auto assigning IP ContainerID="9457e3ff8c4289d1e10d69786716385759af5971be3536c9639186102edd06a7" HandleID="k8s-pod-network.9457e3ff8c4289d1e10d69786716385759af5971be3536c9639186102edd06a7" Workload="srv--jtkau.gb1.brightbox.com-k8s-calico--apiserver--66b476d74--xnzfh-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00025d010), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"srv-jtkau.gb1.brightbox.com", "pod":"calico-apiserver-66b476d74-xnzfh", "timestamp":"2025-10-29 04:41:37.601818123 +0000 UTC"}, Hostname:"srv-jtkau.gb1.brightbox.com", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 29 04:41:37.723173 env[1204]: 2025-10-29 04:41:37.602 [INFO][4241] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 29 04:41:37.723173 env[1204]: 2025-10-29 04:41:37.602 [INFO][4241] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 29 04:41:37.723173 env[1204]: 2025-10-29 04:41:37.602 [INFO][4241] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'srv-jtkau.gb1.brightbox.com' Oct 29 04:41:37.723173 env[1204]: 2025-10-29 04:41:37.617 [INFO][4241] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.9457e3ff8c4289d1e10d69786716385759af5971be3536c9639186102edd06a7" host="srv-jtkau.gb1.brightbox.com" Oct 29 04:41:37.723173 env[1204]: 2025-10-29 04:41:37.626 [INFO][4241] ipam/ipam.go 394: Looking up existing affinities for host host="srv-jtkau.gb1.brightbox.com" Oct 29 04:41:37.723173 env[1204]: 2025-10-29 04:41:37.634 [INFO][4241] ipam/ipam.go 511: Trying affinity for 192.168.110.192/26 host="srv-jtkau.gb1.brightbox.com" Oct 29 04:41:37.723173 env[1204]: 2025-10-29 04:41:37.637 [INFO][4241] ipam/ipam.go 158: Attempting to load block cidr=192.168.110.192/26 host="srv-jtkau.gb1.brightbox.com" Oct 29 04:41:37.723173 env[1204]: 2025-10-29 04:41:37.640 [INFO][4241] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.110.192/26 host="srv-jtkau.gb1.brightbox.com" Oct 29 04:41:37.723173 env[1204]: 2025-10-29 04:41:37.640 [INFO][4241] ipam/ipam.go 1219: Attempting to assign 1 addresses from block block=192.168.110.192/26 handle="k8s-pod-network.9457e3ff8c4289d1e10d69786716385759af5971be3536c9639186102edd06a7" host="srv-jtkau.gb1.brightbox.com" Oct 29 04:41:37.723173 env[1204]: 2025-10-29 04:41:37.643 [INFO][4241] ipam/ipam.go 1780: Creating new handle: k8s-pod-network.9457e3ff8c4289d1e10d69786716385759af5971be3536c9639186102edd06a7 Oct 29 04:41:37.723173 env[1204]: 2025-10-29 04:41:37.656 [INFO][4241] ipam/ipam.go 1246: Writing block in order to claim IPs block=192.168.110.192/26 handle="k8s-pod-network.9457e3ff8c4289d1e10d69786716385759af5971be3536c9639186102edd06a7" host="srv-jtkau.gb1.brightbox.com" Oct 29 04:41:37.723173 env[1204]: 2025-10-29 04:41:37.666 [INFO][4241] ipam/ipam.go 1262: Successfully claimed IPs: [192.168.110.199/26] block=192.168.110.192/26 handle="k8s-pod-network.9457e3ff8c4289d1e10d69786716385759af5971be3536c9639186102edd06a7" host="srv-jtkau.gb1.brightbox.com" Oct 29 04:41:37.723173 env[1204]: 2025-10-29 04:41:37.666 [INFO][4241] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.110.199/26] handle="k8s-pod-network.9457e3ff8c4289d1e10d69786716385759af5971be3536c9639186102edd06a7" host="srv-jtkau.gb1.brightbox.com" Oct 29 04:41:37.723173 env[1204]: 2025-10-29 04:41:37.666 [INFO][4241] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 29 04:41:37.723173 env[1204]: 2025-10-29 04:41:37.666 [INFO][4241] ipam/ipam_plugin.go 299: Calico CNI IPAM assigned addresses IPv4=[192.168.110.199/26] IPv6=[] ContainerID="9457e3ff8c4289d1e10d69786716385759af5971be3536c9639186102edd06a7" HandleID="k8s-pod-network.9457e3ff8c4289d1e10d69786716385759af5971be3536c9639186102edd06a7" Workload="srv--jtkau.gb1.brightbox.com-k8s-calico--apiserver--66b476d74--xnzfh-eth0" Oct 29 04:41:37.724565 env[1204]: 2025-10-29 04:41:37.670 [INFO][4227] cni-plugin/k8s.go 418: Populated endpoint ContainerID="9457e3ff8c4289d1e10d69786716385759af5971be3536c9639186102edd06a7" Namespace="calico-apiserver" Pod="calico-apiserver-66b476d74-xnzfh" WorkloadEndpoint="srv--jtkau.gb1.brightbox.com-k8s-calico--apiserver--66b476d74--xnzfh-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--jtkau.gb1.brightbox.com-k8s-calico--apiserver--66b476d74--xnzfh-eth0", GenerateName:"calico-apiserver-66b476d74-", Namespace:"calico-apiserver", SelfLink:"", UID:"9af229d2-d1e1-477e-9280-265e378cba4b", ResourceVersion:"1050", Generation:0, CreationTimestamp:time.Date(2025, time.October, 29, 4, 40, 47, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"66b476d74", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-jtkau.gb1.brightbox.com", ContainerID:"", Pod:"calico-apiserver-66b476d74-xnzfh", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.110.199/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali21bbec9fe5c", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 29 04:41:37.724565 env[1204]: 2025-10-29 04:41:37.670 [INFO][4227] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.110.199/32] ContainerID="9457e3ff8c4289d1e10d69786716385759af5971be3536c9639186102edd06a7" Namespace="calico-apiserver" Pod="calico-apiserver-66b476d74-xnzfh" WorkloadEndpoint="srv--jtkau.gb1.brightbox.com-k8s-calico--apiserver--66b476d74--xnzfh-eth0" Oct 29 04:41:37.724565 env[1204]: 2025-10-29 04:41:37.670 [INFO][4227] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali21bbec9fe5c ContainerID="9457e3ff8c4289d1e10d69786716385759af5971be3536c9639186102edd06a7" Namespace="calico-apiserver" Pod="calico-apiserver-66b476d74-xnzfh" WorkloadEndpoint="srv--jtkau.gb1.brightbox.com-k8s-calico--apiserver--66b476d74--xnzfh-eth0" Oct 29 04:41:37.724565 env[1204]: 2025-10-29 04:41:37.693 [INFO][4227] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="9457e3ff8c4289d1e10d69786716385759af5971be3536c9639186102edd06a7" Namespace="calico-apiserver" Pod="calico-apiserver-66b476d74-xnzfh" WorkloadEndpoint="srv--jtkau.gb1.brightbox.com-k8s-calico--apiserver--66b476d74--xnzfh-eth0" Oct 29 04:41:37.724565 env[1204]: 2025-10-29 04:41:37.694 [INFO][4227] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="9457e3ff8c4289d1e10d69786716385759af5971be3536c9639186102edd06a7" Namespace="calico-apiserver" Pod="calico-apiserver-66b476d74-xnzfh" WorkloadEndpoint="srv--jtkau.gb1.brightbox.com-k8s-calico--apiserver--66b476d74--xnzfh-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--jtkau.gb1.brightbox.com-k8s-calico--apiserver--66b476d74--xnzfh-eth0", GenerateName:"calico-apiserver-66b476d74-", Namespace:"calico-apiserver", SelfLink:"", UID:"9af229d2-d1e1-477e-9280-265e378cba4b", ResourceVersion:"1050", Generation:0, CreationTimestamp:time.Date(2025, time.October, 29, 4, 40, 47, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"66b476d74", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-jtkau.gb1.brightbox.com", ContainerID:"9457e3ff8c4289d1e10d69786716385759af5971be3536c9639186102edd06a7", Pod:"calico-apiserver-66b476d74-xnzfh", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.110.199/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali21bbec9fe5c", MAC:"a6:5e:57:cd:34:14", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 29 04:41:37.724565 env[1204]: 2025-10-29 04:41:37.719 [INFO][4227] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="9457e3ff8c4289d1e10d69786716385759af5971be3536c9639186102edd06a7" Namespace="calico-apiserver" Pod="calico-apiserver-66b476d74-xnzfh" WorkloadEndpoint="srv--jtkau.gb1.brightbox.com-k8s-calico--apiserver--66b476d74--xnzfh-eth0" Oct 29 04:41:37.761124 env[1204]: time="2025-10-29T04:41:37.760989145Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 29 04:41:37.761428 env[1204]: time="2025-10-29T04:41:37.761364545Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 29 04:41:37.761696 env[1204]: time="2025-10-29T04:41:37.761595978Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 29 04:41:37.762179 env[1204]: time="2025-10-29T04:41:37.762120636Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/9457e3ff8c4289d1e10d69786716385759af5971be3536c9639186102edd06a7 pid=4260 runtime=io.containerd.runc.v2 Oct 29 04:41:37.764000 audit[4265]: NETFILTER_CFG table=filter:120 family=2 entries=62 op=nft_register_chain pid=4265 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 29 04:41:37.764000 audit[4265]: SYSCALL arch=c000003e syscall=46 success=yes exit=31740 a0=3 a1=7ffeee21ff40 a2=0 a3=7ffeee21ff2c items=0 ppid=3392 pid=4265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:37.764000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 29 04:41:37.799166 systemd[1]: Started cri-containerd-9457e3ff8c4289d1e10d69786716385759af5971be3536c9639186102edd06a7.scope. Oct 29 04:41:37.830000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:37.830000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:37.830000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:37.830000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:37.830000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:37.830000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:37.830000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:37.830000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:37.830000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:37.830000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:37.830000 audit: BPF prog-id=193 op=LOAD Oct 29 04:41:37.832000 audit[4272]: AVC avc: denied { bpf } for pid=4272 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:37.832000 audit[4272]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=4260 pid=4272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:37.832000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934353765336666386334323839643165313064363937383637313633 Oct 29 04:41:37.832000 audit[4272]: AVC avc: denied { perfmon } for pid=4272 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:37.832000 audit[4272]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=4260 pid=4272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:37.832000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934353765336666386334323839643165313064363937383637313633 Oct 29 04:41:37.832000 audit[4272]: AVC avc: denied { bpf } for pid=4272 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:37.832000 audit[4272]: AVC avc: denied { bpf } for pid=4272 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:37.832000 audit[4272]: AVC avc: denied { bpf } for pid=4272 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:37.832000 audit[4272]: AVC avc: denied { perfmon } for pid=4272 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:37.832000 audit[4272]: AVC avc: denied { perfmon } for pid=4272 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:37.832000 audit[4272]: AVC avc: denied { perfmon } for pid=4272 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:37.832000 audit[4272]: AVC avc: denied { perfmon } for pid=4272 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:37.832000 audit[4272]: AVC avc: denied { perfmon } for pid=4272 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:37.832000 audit[4272]: AVC avc: denied { bpf } for pid=4272 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:37.832000 audit[4272]: AVC avc: denied { bpf } for pid=4272 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:37.832000 audit: BPF prog-id=194 op=LOAD Oct 29 04:41:37.832000 audit[4272]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0002ff070 items=0 ppid=4260 pid=4272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:37.832000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934353765336666386334323839643165313064363937383637313633 Oct 29 04:41:37.832000 audit[4272]: AVC avc: denied { bpf } for pid=4272 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:37.832000 audit[4272]: AVC avc: denied { bpf } for pid=4272 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:37.832000 audit[4272]: AVC avc: denied { perfmon } for pid=4272 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:37.832000 audit[4272]: AVC avc: denied { perfmon } for pid=4272 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:37.832000 audit[4272]: AVC avc: denied { perfmon } for pid=4272 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:37.832000 audit[4272]: AVC avc: denied { perfmon } for pid=4272 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:37.832000 audit[4272]: AVC avc: denied { perfmon } for pid=4272 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:37.832000 audit[4272]: AVC avc: denied { bpf } for pid=4272 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:37.832000 audit[4272]: AVC avc: denied { bpf } for pid=4272 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:37.832000 audit: BPF prog-id=195 op=LOAD Oct 29 04:41:37.832000 audit[4272]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0002ff0b8 items=0 ppid=4260 pid=4272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:37.832000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934353765336666386334323839643165313064363937383637313633 Oct 29 04:41:37.832000 audit: BPF prog-id=195 op=UNLOAD Oct 29 04:41:37.832000 audit: BPF prog-id=194 op=UNLOAD Oct 29 04:41:37.833000 audit[4272]: AVC avc: denied { bpf } for pid=4272 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:37.833000 audit[4272]: AVC avc: denied { bpf } for pid=4272 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:37.833000 audit[4272]: AVC avc: denied { bpf } for pid=4272 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:37.833000 audit[4272]: AVC avc: denied { perfmon } for pid=4272 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:37.833000 audit[4272]: AVC avc: denied { perfmon } for pid=4272 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:37.833000 audit[4272]: AVC avc: denied { perfmon } for pid=4272 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:37.833000 audit[4272]: AVC avc: denied { perfmon } for pid=4272 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:37.833000 audit[4272]: AVC avc: denied { perfmon } for pid=4272 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:37.833000 audit[4272]: AVC avc: denied { bpf } for pid=4272 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:37.833000 audit[4272]: AVC avc: denied { bpf } for pid=4272 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:37.833000 audit: BPF prog-id=196 op=LOAD Oct 29 04:41:37.833000 audit[4272]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0002ff4c8 items=0 ppid=4260 pid=4272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:37.833000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934353765336666386334323839643165313064363937383637313633 Oct 29 04:41:37.897670 env[1204]: time="2025-10-29T04:41:37.897536863Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-66b476d74-xnzfh,Uid:9af229d2-d1e1-477e-9280-265e378cba4b,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"9457e3ff8c4289d1e10d69786716385759af5971be3536c9639186102edd06a7\"" Oct 29 04:41:37.902177 env[1204]: time="2025-10-29T04:41:37.901915798Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\"" Oct 29 04:41:38.245809 env[1204]: time="2025-10-29T04:41:38.245736871Z" level=info msg="StopPodSandbox for \"e60a5ca3dace57260718564cf1200a77eea8f638b71cc553b50495e72983c2f5\"" Oct 29 04:41:38.249548 env[1204]: time="2025-10-29T04:41:38.249493890Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 29 04:41:38.257037 env[1204]: time="2025-10-29T04:41:38.256949016Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" Oct 29 04:41:38.257907 kubelet[1975]: E1029 04:41:38.257356 1975 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Oct 29 04:41:38.257907 kubelet[1975]: E1029 04:41:38.257571 1975 kuberuntime_image.go:55] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Oct 29 04:41:38.258470 kubelet[1975]: E1029 04:41:38.258009 1975 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.30.4,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:LOG_LEVEL,Value:info,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-2j29h,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/readyz,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod calico-apiserver-66b476d74-xnzfh_calico-apiserver(9af229d2-d1e1-477e-9280-265e378cba4b): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" logger="UnhandledError" Oct 29 04:41:38.260060 kubelet[1975]: E1029 04:41:38.259969 1975 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-66b476d74-xnzfh" podUID="9af229d2-d1e1-477e-9280-265e378cba4b" Oct 29 04:41:38.388256 env[1204]: 2025-10-29 04:41:38.329 [INFO][4305] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="e60a5ca3dace57260718564cf1200a77eea8f638b71cc553b50495e72983c2f5" Oct 29 04:41:38.388256 env[1204]: 2025-10-29 04:41:38.329 [INFO][4305] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="e60a5ca3dace57260718564cf1200a77eea8f638b71cc553b50495e72983c2f5" iface="eth0" netns="/var/run/netns/cni-aa74cca2-85fa-455d-320b-a0cc16c0c448" Oct 29 04:41:38.388256 env[1204]: 2025-10-29 04:41:38.330 [INFO][4305] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="e60a5ca3dace57260718564cf1200a77eea8f638b71cc553b50495e72983c2f5" iface="eth0" netns="/var/run/netns/cni-aa74cca2-85fa-455d-320b-a0cc16c0c448" Oct 29 04:41:38.388256 env[1204]: 2025-10-29 04:41:38.331 [INFO][4305] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="e60a5ca3dace57260718564cf1200a77eea8f638b71cc553b50495e72983c2f5" iface="eth0" netns="/var/run/netns/cni-aa74cca2-85fa-455d-320b-a0cc16c0c448" Oct 29 04:41:38.388256 env[1204]: 2025-10-29 04:41:38.331 [INFO][4305] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="e60a5ca3dace57260718564cf1200a77eea8f638b71cc553b50495e72983c2f5" Oct 29 04:41:38.388256 env[1204]: 2025-10-29 04:41:38.331 [INFO][4305] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e60a5ca3dace57260718564cf1200a77eea8f638b71cc553b50495e72983c2f5" Oct 29 04:41:38.388256 env[1204]: 2025-10-29 04:41:38.370 [INFO][4313] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="e60a5ca3dace57260718564cf1200a77eea8f638b71cc553b50495e72983c2f5" HandleID="k8s-pod-network.e60a5ca3dace57260718564cf1200a77eea8f638b71cc553b50495e72983c2f5" Workload="srv--jtkau.gb1.brightbox.com-k8s-calico--apiserver--66b476d74--9x56r-eth0" Oct 29 04:41:38.388256 env[1204]: 2025-10-29 04:41:38.371 [INFO][4313] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 29 04:41:38.388256 env[1204]: 2025-10-29 04:41:38.371 [INFO][4313] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 29 04:41:38.388256 env[1204]: 2025-10-29 04:41:38.380 [WARNING][4313] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="e60a5ca3dace57260718564cf1200a77eea8f638b71cc553b50495e72983c2f5" HandleID="k8s-pod-network.e60a5ca3dace57260718564cf1200a77eea8f638b71cc553b50495e72983c2f5" Workload="srv--jtkau.gb1.brightbox.com-k8s-calico--apiserver--66b476d74--9x56r-eth0" Oct 29 04:41:38.388256 env[1204]: 2025-10-29 04:41:38.380 [INFO][4313] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="e60a5ca3dace57260718564cf1200a77eea8f638b71cc553b50495e72983c2f5" HandleID="k8s-pod-network.e60a5ca3dace57260718564cf1200a77eea8f638b71cc553b50495e72983c2f5" Workload="srv--jtkau.gb1.brightbox.com-k8s-calico--apiserver--66b476d74--9x56r-eth0" Oct 29 04:41:38.388256 env[1204]: 2025-10-29 04:41:38.383 [INFO][4313] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 29 04:41:38.388256 env[1204]: 2025-10-29 04:41:38.385 [INFO][4305] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="e60a5ca3dace57260718564cf1200a77eea8f638b71cc553b50495e72983c2f5" Oct 29 04:41:38.389877 env[1204]: time="2025-10-29T04:41:38.389795153Z" level=info msg="TearDown network for sandbox \"e60a5ca3dace57260718564cf1200a77eea8f638b71cc553b50495e72983c2f5\" successfully" Oct 29 04:41:38.390017 env[1204]: time="2025-10-29T04:41:38.389985470Z" level=info msg="StopPodSandbox for \"e60a5ca3dace57260718564cf1200a77eea8f638b71cc553b50495e72983c2f5\" returns successfully" Oct 29 04:41:38.391350 env[1204]: time="2025-10-29T04:41:38.391314844Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-66b476d74-9x56r,Uid:c55cf193-f032-43fb-94cc-3208d0f6de96,Namespace:calico-apiserver,Attempt:1,}" Oct 29 04:41:38.465495 systemd[1]: run-containerd-runc-k8s.io-9457e3ff8c4289d1e10d69786716385759af5971be3536c9639186102edd06a7-runc.0X6g71.mount: Deactivated successfully. Oct 29 04:41:38.465837 systemd[1]: run-netns-cni\x2daa74cca2\x2d85fa\x2d455d\x2d320b\x2da0cc16c0c448.mount: Deactivated successfully. Oct 29 04:41:38.586733 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali34bee461f0e: link becomes ready Oct 29 04:41:38.589129 systemd-networkd[1018]: cali34bee461f0e: Link UP Oct 29 04:41:38.589533 systemd-networkd[1018]: cali34bee461f0e: Gained carrier Oct 29 04:41:38.609496 env[1204]: 2025-10-29 04:41:38.469 [INFO][4321] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {srv--jtkau.gb1.brightbox.com-k8s-calico--apiserver--66b476d74--9x56r-eth0 calico-apiserver-66b476d74- calico-apiserver c55cf193-f032-43fb-94cc-3208d0f6de96 1058 0 2025-10-29 04:40:47 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:66b476d74 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s srv-jtkau.gb1.brightbox.com calico-apiserver-66b476d74-9x56r eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali34bee461f0e [] [] }} ContainerID="b8cd6978b6ee5329ba8e7a89368b6cd441c54f939e4983db227c3da372f768a7" Namespace="calico-apiserver" Pod="calico-apiserver-66b476d74-9x56r" WorkloadEndpoint="srv--jtkau.gb1.brightbox.com-k8s-calico--apiserver--66b476d74--9x56r-" Oct 29 04:41:38.609496 env[1204]: 2025-10-29 04:41:38.469 [INFO][4321] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="b8cd6978b6ee5329ba8e7a89368b6cd441c54f939e4983db227c3da372f768a7" Namespace="calico-apiserver" Pod="calico-apiserver-66b476d74-9x56r" WorkloadEndpoint="srv--jtkau.gb1.brightbox.com-k8s-calico--apiserver--66b476d74--9x56r-eth0" Oct 29 04:41:38.609496 env[1204]: 2025-10-29 04:41:38.511 [INFO][4332] ipam/ipam_plugin.go 227: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="b8cd6978b6ee5329ba8e7a89368b6cd441c54f939e4983db227c3da372f768a7" HandleID="k8s-pod-network.b8cd6978b6ee5329ba8e7a89368b6cd441c54f939e4983db227c3da372f768a7" Workload="srv--jtkau.gb1.brightbox.com-k8s-calico--apiserver--66b476d74--9x56r-eth0" Oct 29 04:41:38.609496 env[1204]: 2025-10-29 04:41:38.512 [INFO][4332] ipam/ipam_plugin.go 275: Auto assigning IP ContainerID="b8cd6978b6ee5329ba8e7a89368b6cd441c54f939e4983db227c3da372f768a7" HandleID="k8s-pod-network.b8cd6978b6ee5329ba8e7a89368b6cd441c54f939e4983db227c3da372f768a7" Workload="srv--jtkau.gb1.brightbox.com-k8s-calico--apiserver--66b476d74--9x56r-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002d5090), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"srv-jtkau.gb1.brightbox.com", "pod":"calico-apiserver-66b476d74-9x56r", "timestamp":"2025-10-29 04:41:38.511965352 +0000 UTC"}, Hostname:"srv-jtkau.gb1.brightbox.com", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Oct 29 04:41:38.609496 env[1204]: 2025-10-29 04:41:38.512 [INFO][4332] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 29 04:41:38.609496 env[1204]: 2025-10-29 04:41:38.512 [INFO][4332] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 29 04:41:38.609496 env[1204]: 2025-10-29 04:41:38.512 [INFO][4332] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'srv-jtkau.gb1.brightbox.com' Oct 29 04:41:38.609496 env[1204]: 2025-10-29 04:41:38.523 [INFO][4332] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.b8cd6978b6ee5329ba8e7a89368b6cd441c54f939e4983db227c3da372f768a7" host="srv-jtkau.gb1.brightbox.com" Oct 29 04:41:38.609496 env[1204]: 2025-10-29 04:41:38.532 [INFO][4332] ipam/ipam.go 394: Looking up existing affinities for host host="srv-jtkau.gb1.brightbox.com" Oct 29 04:41:38.609496 env[1204]: 2025-10-29 04:41:38.539 [INFO][4332] ipam/ipam.go 511: Trying affinity for 192.168.110.192/26 host="srv-jtkau.gb1.brightbox.com" Oct 29 04:41:38.609496 env[1204]: 2025-10-29 04:41:38.542 [INFO][4332] ipam/ipam.go 158: Attempting to load block cidr=192.168.110.192/26 host="srv-jtkau.gb1.brightbox.com" Oct 29 04:41:38.609496 env[1204]: 2025-10-29 04:41:38.552 [INFO][4332] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.110.192/26 host="srv-jtkau.gb1.brightbox.com" Oct 29 04:41:38.609496 env[1204]: 2025-10-29 04:41:38.552 [INFO][4332] ipam/ipam.go 1219: Attempting to assign 1 addresses from block block=192.168.110.192/26 handle="k8s-pod-network.b8cd6978b6ee5329ba8e7a89368b6cd441c54f939e4983db227c3da372f768a7" host="srv-jtkau.gb1.brightbox.com" Oct 29 04:41:38.609496 env[1204]: 2025-10-29 04:41:38.557 [INFO][4332] ipam/ipam.go 1780: Creating new handle: k8s-pod-network.b8cd6978b6ee5329ba8e7a89368b6cd441c54f939e4983db227c3da372f768a7 Oct 29 04:41:38.609496 env[1204]: 2025-10-29 04:41:38.564 [INFO][4332] ipam/ipam.go 1246: Writing block in order to claim IPs block=192.168.110.192/26 handle="k8s-pod-network.b8cd6978b6ee5329ba8e7a89368b6cd441c54f939e4983db227c3da372f768a7" host="srv-jtkau.gb1.brightbox.com" Oct 29 04:41:38.609496 env[1204]: 2025-10-29 04:41:38.573 [INFO][4332] ipam/ipam.go 1262: Successfully claimed IPs: [192.168.110.200/26] block=192.168.110.192/26 handle="k8s-pod-network.b8cd6978b6ee5329ba8e7a89368b6cd441c54f939e4983db227c3da372f768a7" host="srv-jtkau.gb1.brightbox.com" Oct 29 04:41:38.609496 env[1204]: 2025-10-29 04:41:38.574 [INFO][4332] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.110.200/26] handle="k8s-pod-network.b8cd6978b6ee5329ba8e7a89368b6cd441c54f939e4983db227c3da372f768a7" host="srv-jtkau.gb1.brightbox.com" Oct 29 04:41:38.609496 env[1204]: 2025-10-29 04:41:38.574 [INFO][4332] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 29 04:41:38.609496 env[1204]: 2025-10-29 04:41:38.574 [INFO][4332] ipam/ipam_plugin.go 299: Calico CNI IPAM assigned addresses IPv4=[192.168.110.200/26] IPv6=[] ContainerID="b8cd6978b6ee5329ba8e7a89368b6cd441c54f939e4983db227c3da372f768a7" HandleID="k8s-pod-network.b8cd6978b6ee5329ba8e7a89368b6cd441c54f939e4983db227c3da372f768a7" Workload="srv--jtkau.gb1.brightbox.com-k8s-calico--apiserver--66b476d74--9x56r-eth0" Oct 29 04:41:38.611007 env[1204]: 2025-10-29 04:41:38.577 [INFO][4321] cni-plugin/k8s.go 418: Populated endpoint ContainerID="b8cd6978b6ee5329ba8e7a89368b6cd441c54f939e4983db227c3da372f768a7" Namespace="calico-apiserver" Pod="calico-apiserver-66b476d74-9x56r" WorkloadEndpoint="srv--jtkau.gb1.brightbox.com-k8s-calico--apiserver--66b476d74--9x56r-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--jtkau.gb1.brightbox.com-k8s-calico--apiserver--66b476d74--9x56r-eth0", GenerateName:"calico-apiserver-66b476d74-", Namespace:"calico-apiserver", SelfLink:"", UID:"c55cf193-f032-43fb-94cc-3208d0f6de96", ResourceVersion:"1058", Generation:0, CreationTimestamp:time.Date(2025, time.October, 29, 4, 40, 47, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"66b476d74", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-jtkau.gb1.brightbox.com", ContainerID:"", Pod:"calico-apiserver-66b476d74-9x56r", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.110.200/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali34bee461f0e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 29 04:41:38.611007 env[1204]: 2025-10-29 04:41:38.577 [INFO][4321] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.110.200/32] ContainerID="b8cd6978b6ee5329ba8e7a89368b6cd441c54f939e4983db227c3da372f768a7" Namespace="calico-apiserver" Pod="calico-apiserver-66b476d74-9x56r" WorkloadEndpoint="srv--jtkau.gb1.brightbox.com-k8s-calico--apiserver--66b476d74--9x56r-eth0" Oct 29 04:41:38.611007 env[1204]: 2025-10-29 04:41:38.577 [INFO][4321] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali34bee461f0e ContainerID="b8cd6978b6ee5329ba8e7a89368b6cd441c54f939e4983db227c3da372f768a7" Namespace="calico-apiserver" Pod="calico-apiserver-66b476d74-9x56r" WorkloadEndpoint="srv--jtkau.gb1.brightbox.com-k8s-calico--apiserver--66b476d74--9x56r-eth0" Oct 29 04:41:38.611007 env[1204]: 2025-10-29 04:41:38.585 [INFO][4321] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="b8cd6978b6ee5329ba8e7a89368b6cd441c54f939e4983db227c3da372f768a7" Namespace="calico-apiserver" Pod="calico-apiserver-66b476d74-9x56r" WorkloadEndpoint="srv--jtkau.gb1.brightbox.com-k8s-calico--apiserver--66b476d74--9x56r-eth0" Oct 29 04:41:38.611007 env[1204]: 2025-10-29 04:41:38.586 [INFO][4321] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="b8cd6978b6ee5329ba8e7a89368b6cd441c54f939e4983db227c3da372f768a7" Namespace="calico-apiserver" Pod="calico-apiserver-66b476d74-9x56r" WorkloadEndpoint="srv--jtkau.gb1.brightbox.com-k8s-calico--apiserver--66b476d74--9x56r-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--jtkau.gb1.brightbox.com-k8s-calico--apiserver--66b476d74--9x56r-eth0", GenerateName:"calico-apiserver-66b476d74-", Namespace:"calico-apiserver", SelfLink:"", UID:"c55cf193-f032-43fb-94cc-3208d0f6de96", ResourceVersion:"1058", Generation:0, CreationTimestamp:time.Date(2025, time.October, 29, 4, 40, 47, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"66b476d74", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-jtkau.gb1.brightbox.com", ContainerID:"b8cd6978b6ee5329ba8e7a89368b6cd441c54f939e4983db227c3da372f768a7", Pod:"calico-apiserver-66b476d74-9x56r", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.110.200/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali34bee461f0e", MAC:"7a:c2:3f:7e:6c:8d", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 29 04:41:38.611007 env[1204]: 2025-10-29 04:41:38.606 [INFO][4321] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="b8cd6978b6ee5329ba8e7a89368b6cd441c54f939e4983db227c3da372f768a7" Namespace="calico-apiserver" Pod="calico-apiserver-66b476d74-9x56r" WorkloadEndpoint="srv--jtkau.gb1.brightbox.com-k8s-calico--apiserver--66b476d74--9x56r-eth0" Oct 29 04:41:38.630896 env[1204]: time="2025-10-29T04:41:38.630762890Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Oct 29 04:41:38.630896 env[1204]: time="2025-10-29T04:41:38.630835207Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Oct 29 04:41:38.630896 env[1204]: time="2025-10-29T04:41:38.630852573Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Oct 29 04:41:38.631546 env[1204]: time="2025-10-29T04:41:38.631488731Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b8cd6978b6ee5329ba8e7a89368b6cd441c54f939e4983db227c3da372f768a7 pid=4353 runtime=io.containerd.runc.v2 Oct 29 04:41:38.668410 systemd[1]: run-containerd-runc-k8s.io-b8cd6978b6ee5329ba8e7a89368b6cd441c54f939e4983db227c3da372f768a7-runc.hWIKas.mount: Deactivated successfully. Oct 29 04:41:38.675000 audit[4373]: NETFILTER_CFG table=filter:121 family=2 entries=59 op=nft_register_chain pid=4373 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Oct 29 04:41:38.675000 audit[4373]: SYSCALL arch=c000003e syscall=46 success=yes exit=29460 a0=3 a1=7ffe09c0b2c0 a2=0 a3=7ffe09c0b2ac items=0 ppid=3392 pid=4373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:38.675000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Oct 29 04:41:38.675253 systemd[1]: Started cri-containerd-b8cd6978b6ee5329ba8e7a89368b6cd441c54f939e4983db227c3da372f768a7.scope. Oct 29 04:41:38.715000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:38.722917 kernel: kauditd_printk_skb: 185 callbacks suppressed Oct 29 04:41:38.723180 kernel: audit: type=1400 audit(1761712898.715:1326): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:38.715000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:38.715000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:38.738794 kernel: audit: type=1400 audit(1761712898.715:1327): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:38.738997 kernel: audit: type=1400 audit(1761712898.715:1328): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:38.739062 kernel: audit: type=1400 audit(1761712898.715:1329): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:38.715000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:38.715000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:38.748535 kernel: audit: type=1400 audit(1761712898.715:1330): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:38.748788 kernel: audit: type=1400 audit(1761712898.715:1331): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:38.715000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:38.757464 kernel: audit: type=1400 audit(1761712898.715:1332): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:38.715000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:38.715000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:38.765231 kernel: audit: type=1400 audit(1761712898.715:1333): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:38.765456 kernel: audit: type=1400 audit(1761712898.715:1334): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:38.715000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:38.715000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:38.774964 kernel: audit: type=1400 audit(1761712898.715:1335): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:38.715000 audit: BPF prog-id=197 op=LOAD Oct 29 04:41:38.727000 audit[4364]: AVC avc: denied { bpf } for pid=4364 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:38.727000 audit[4364]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4353 pid=4364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:38.727000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238636436393738623665653533323962613865376138393336386236 Oct 29 04:41:38.727000 audit[4364]: AVC avc: denied { perfmon } for pid=4364 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:38.727000 audit[4364]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4353 pid=4364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:38.727000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238636436393738623665653533323962613865376138393336386236 Oct 29 04:41:38.727000 audit[4364]: AVC avc: denied { bpf } for pid=4364 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:38.727000 audit[4364]: AVC avc: denied { bpf } for pid=4364 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:38.727000 audit[4364]: AVC avc: denied { bpf } for pid=4364 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:38.727000 audit[4364]: AVC avc: denied { perfmon } for pid=4364 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:38.727000 audit[4364]: AVC avc: denied { perfmon } for pid=4364 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:38.727000 audit[4364]: AVC avc: denied { perfmon } for pid=4364 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:38.727000 audit[4364]: AVC avc: denied { perfmon } for pid=4364 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:38.727000 audit[4364]: AVC avc: denied { perfmon } for pid=4364 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:38.727000 audit[4364]: AVC avc: denied { bpf } for pid=4364 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:38.727000 audit[4364]: AVC avc: denied { bpf } for pid=4364 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:38.727000 audit: BPF prog-id=198 op=LOAD Oct 29 04:41:38.727000 audit[4364]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003631f0 items=0 ppid=4353 pid=4364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:38.727000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238636436393738623665653533323962613865376138393336386236 Oct 29 04:41:38.727000 audit[4364]: AVC avc: denied { bpf } for pid=4364 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:38.727000 audit[4364]: AVC avc: denied { bpf } for pid=4364 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:38.727000 audit[4364]: AVC avc: denied { perfmon } for pid=4364 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:38.727000 audit[4364]: AVC avc: denied { perfmon } for pid=4364 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:38.727000 audit[4364]: AVC avc: denied { perfmon } for pid=4364 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:38.727000 audit[4364]: AVC avc: denied { perfmon } for pid=4364 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:38.727000 audit[4364]: AVC avc: denied { perfmon } for pid=4364 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:38.727000 audit[4364]: AVC avc: denied { bpf } for pid=4364 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:38.727000 audit[4364]: AVC avc: denied { bpf } for pid=4364 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:38.727000 audit: BPF prog-id=199 op=LOAD Oct 29 04:41:38.727000 audit[4364]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000363238 items=0 ppid=4353 pid=4364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:38.727000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238636436393738623665653533323962613865376138393336386236 Oct 29 04:41:38.728000 audit: BPF prog-id=199 op=UNLOAD Oct 29 04:41:38.728000 audit: BPF prog-id=198 op=UNLOAD Oct 29 04:41:38.728000 audit[4364]: AVC avc: denied { bpf } for pid=4364 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:38.728000 audit[4364]: AVC avc: denied { bpf } for pid=4364 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:38.728000 audit[4364]: AVC avc: denied { bpf } for pid=4364 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:38.728000 audit[4364]: AVC avc: denied { perfmon } for pid=4364 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:38.728000 audit[4364]: AVC avc: denied { perfmon } for pid=4364 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:38.728000 audit[4364]: AVC avc: denied { perfmon } for pid=4364 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:38.728000 audit[4364]: AVC avc: denied { perfmon } for pid=4364 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:38.728000 audit[4364]: AVC avc: denied { perfmon } for pid=4364 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:38.728000 audit[4364]: AVC avc: denied { bpf } for pid=4364 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:38.728000 audit[4364]: AVC avc: denied { bpf } for pid=4364 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Oct 29 04:41:38.728000 audit: BPF prog-id=200 op=LOAD Oct 29 04:41:38.728000 audit[4364]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000363648 items=0 ppid=4353 pid=4364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:38.728000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238636436393738623665653533323962613865376138393336386236 Oct 29 04:41:38.825316 env[1204]: time="2025-10-29T04:41:38.825222373Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-66b476d74-9x56r,Uid:c55cf193-f032-43fb-94cc-3208d0f6de96,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"b8cd6978b6ee5329ba8e7a89368b6cd441c54f939e4983db227c3da372f768a7\"" Oct 29 04:41:38.829026 env[1204]: time="2025-10-29T04:41:38.828959073Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\"" Oct 29 04:41:38.866962 kubelet[1975]: E1029 04:41:38.862910 1975 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-66b476d74-xnzfh" podUID="9af229d2-d1e1-477e-9280-265e378cba4b" Oct 29 04:41:38.955000 audit[4387]: NETFILTER_CFG table=filter:122 family=2 entries=14 op=nft_register_rule pid=4387 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 29 04:41:38.955000 audit[4387]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffcdae4cb60 a2=0 a3=7ffcdae4cb4c items=0 ppid=2117 pid=4387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:38.955000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 29 04:41:38.961000 audit[4387]: NETFILTER_CFG table=nat:123 family=2 entries=20 op=nft_register_rule pid=4387 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 29 04:41:38.961000 audit[4387]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffcdae4cb60 a2=0 a3=7ffcdae4cb4c items=0 ppid=2117 pid=4387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:38.961000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 29 04:41:39.137439 env[1204]: time="2025-10-29T04:41:39.137315532Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 29 04:41:39.139144 env[1204]: time="2025-10-29T04:41:39.138958295Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" Oct 29 04:41:39.139553 kubelet[1975]: E1029 04:41:39.139484 1975 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Oct 29 04:41:39.139836 kubelet[1975]: E1029 04:41:39.139776 1975 kuberuntime_image.go:55] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Oct 29 04:41:39.140310 kubelet[1975]: E1029 04:41:39.140222 1975 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.30.4,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:LOG_LEVEL,Value:info,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-vfjnd,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/readyz,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod calico-apiserver-66b476d74-9x56r_calico-apiserver(c55cf193-f032-43fb-94cc-3208d0f6de96): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" logger="UnhandledError" Oct 29 04:41:39.141736 kubelet[1975]: E1029 04:41:39.141683 1975 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-66b476d74-9x56r" podUID="c55cf193-f032-43fb-94cc-3208d0f6de96" Oct 29 04:41:39.712151 systemd-networkd[1018]: cali21bbec9fe5c: Gained IPv6LL Oct 29 04:41:39.865375 kubelet[1975]: E1029 04:41:39.865292 1975 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-66b476d74-9x56r" podUID="c55cf193-f032-43fb-94cc-3208d0f6de96" Oct 29 04:41:39.866217 kubelet[1975]: E1029 04:41:39.865646 1975 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-66b476d74-xnzfh" podUID="9af229d2-d1e1-477e-9280-265e378cba4b" Oct 29 04:41:39.916000 audit[4389]: NETFILTER_CFG table=filter:124 family=2 entries=14 op=nft_register_rule pid=4389 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 29 04:41:39.916000 audit[4389]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffc71207560 a2=0 a3=7ffc7120754c items=0 ppid=2117 pid=4389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:39.916000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 29 04:41:39.927000 audit[4389]: NETFILTER_CFG table=nat:125 family=2 entries=20 op=nft_register_rule pid=4389 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 29 04:41:39.927000 audit[4389]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffc71207560 a2=0 a3=7ffc7120754c items=0 ppid=2117 pid=4389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:39.927000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 29 04:41:40.247377 env[1204]: time="2025-10-29T04:41:40.247320752Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.4\"" Oct 29 04:41:40.543969 systemd-networkd[1018]: cali34bee461f0e: Gained IPv6LL Oct 29 04:41:40.631516 env[1204]: time="2025-10-29T04:41:40.631432563Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 29 04:41:40.633408 env[1204]: time="2025-10-29T04:41:40.633327524Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" Oct 29 04:41:40.633960 kubelet[1975]: E1029 04:41:40.633903 1975 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" image="ghcr.io/flatcar/calico/csi:v3.30.4" Oct 29 04:41:40.634223 kubelet[1975]: E1029 04:41:40.633988 1975 kuberuntime_image.go:55] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" image="ghcr.io/flatcar/calico/csi:v3.30.4" Oct 29 04:41:40.634388 kubelet[1975]: E1029 04:41:40.634304 1975 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.30.4,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-h67bl,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*true,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:*false,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*true,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-d8hbp_calico-system(78135185-6b36-431d-89d1-d452e0f3a516): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" logger="UnhandledError" Oct 29 04:41:40.637043 env[1204]: time="2025-10-29T04:41:40.636999431Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\"" Oct 29 04:41:40.954364 env[1204]: time="2025-10-29T04:41:40.954234321Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 29 04:41:40.955763 env[1204]: time="2025-10-29T04:41:40.955649689Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" Oct 29 04:41:40.956196 kubelet[1975]: E1029 04:41:40.956122 1975 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4" Oct 29 04:41:40.956725 kubelet[1975]: E1029 04:41:40.956217 1975 kuberuntime_image.go:55] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4" Oct 29 04:41:40.956725 kubelet[1975]: E1029 04:41:40.956429 1975 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-h67bl,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*true,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:*false,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*true,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-d8hbp_calico-system(78135185-6b36-431d-89d1-d452e0f3a516): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" logger="UnhandledError" Oct 29 04:41:40.958253 kubelet[1975]: E1029 04:41:40.958176 1975 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-d8hbp" podUID="78135185-6b36-431d-89d1-d452e0f3a516" Oct 29 04:41:43.250190 env[1204]: time="2025-10-29T04:41:43.250055759Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.4\"" Oct 29 04:41:43.573173 env[1204]: time="2025-10-29T04:41:43.572740395Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 29 04:41:43.575631 env[1204]: time="2025-10-29T04:41:43.575513980Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found" Oct 29 04:41:43.576319 kubelet[1975]: E1029 04:41:43.576228 1975 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found" image="ghcr.io/flatcar/calico/goldmane:v3.30.4" Oct 29 04:41:43.576995 kubelet[1975]: E1029 04:41:43.576960 1975 kuberuntime_image.go:55] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found" image="ghcr.io/flatcar/calico/goldmane:v3.30.4" Oct 29 04:41:43.577470 kubelet[1975]: E1029 04:41:43.577353 1975 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:goldmane,Image:ghcr.io/flatcar/calico/goldmane:v3.30.4,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:7443,ValueFrom:nil,},EnvVar{Name:SERVER_CERT_PATH,Value:/goldmane-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:SERVER_KEY_PATH,Value:/goldmane-key-pair/tls.key,ValueFrom:nil,},EnvVar{Name:CA_CERT_PATH,Value:/etc/pki/tls/certs/tigera-ca-bundle.crt,ValueFrom:nil,},EnvVar{Name:PUSH_URL,Value:https://guardian.calico-system.svc.cluster.local:443/api/v1/flows/bulk,ValueFrom:nil,},EnvVar{Name:FILE_CONFIG_PATH,Value:/config/config.json,ValueFrom:nil,},EnvVar{Name:HEALTH_ENABLED,Value:true,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:config,ReadOnly:true,MountPath:/config,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-key-pair,ReadOnly:true,MountPath:/goldmane-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-zbz8q,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -live],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -ready],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:30,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod goldmane-666569f655-w7zrh_calico-system(4809fb25-1663-4bc2-b12f-599470e2bb91): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found" logger="UnhandledError" Oct 29 04:41:43.578936 kubelet[1975]: E1029 04:41:43.578861 1975 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found\"" pod="calico-system/goldmane-666569f655-w7zrh" podUID="4809fb25-1663-4bc2-b12f-599470e2bb91" Oct 29 04:41:44.248874 env[1204]: time="2025-10-29T04:41:44.248755226Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\"" Oct 29 04:41:44.565461 env[1204]: time="2025-10-29T04:41:44.565241165Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 29 04:41:44.567106 env[1204]: time="2025-10-29T04:41:44.567017580Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found" Oct 29 04:41:44.567618 kubelet[1975]: E1029 04:41:44.567511 1975 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found" image="ghcr.io/flatcar/calico/kube-controllers:v3.30.4" Oct 29 04:41:44.567915 kubelet[1975]: E1029 04:41:44.567858 1975 kuberuntime_image.go:55] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found" image="ghcr.io/flatcar/calico/kube-controllers:v3.30.4" Oct 29 04:41:44.568421 kubelet[1975]: E1029 04:41:44.568315 1975 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:calico-kube-controllers,Image:ghcr.io/flatcar/calico/kube-controllers:v3.30.4,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:KUBE_CONTROLLERS_CONFIG_NAME,Value:default,ValueFrom:nil,},EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:ENABLED_CONTROLLERS,Value:node,loadbalancer,ValueFrom:nil,},EnvVar{Name:DISABLE_KUBE_CONTROLLERS_CONFIG_API,Value:false,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:CA_CRT_PATH,Value:/etc/pki/tls/certs/tigera-ca-bundle.crt,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:tigera-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:tigera-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/cert.pem,SubPath:ca-bundle.crt,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-kp7fs,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/usr/bin/check-status -l],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:10,TimeoutSeconds:10,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:6,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/usr/bin/check-status -r],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:10,PeriodSeconds:30,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*999,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod calico-kube-controllers-76dd6544c7-psclk_calico-system(7c4e2a15-2feb-448f-b8ed-a786076858ec): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found" logger="UnhandledError" Oct 29 04:41:44.569967 kubelet[1975]: E1029 04:41:44.569896 1975 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-kube-controllers\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found\"" pod="calico-system/calico-kube-controllers-76dd6544c7-psclk" podUID="7c4e2a15-2feb-448f-b8ed-a786076858ec" Oct 29 04:41:45.252496 env[1204]: time="2025-10-29T04:41:45.251965618Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.4\"" Oct 29 04:41:45.582710 env[1204]: time="2025-10-29T04:41:45.582106437Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 29 04:41:45.584280 env[1204]: time="2025-10-29T04:41:45.583953779Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.4\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found" Oct 29 04:41:45.584917 kubelet[1975]: E1029 04:41:45.584744 1975 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.4\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found" image="ghcr.io/flatcar/calico/whisker:v3.30.4" Oct 29 04:41:45.585577 kubelet[1975]: E1029 04:41:45.585539 1975 kuberuntime_image.go:55] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.4\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found" image="ghcr.io/flatcar/calico/whisker:v3.30.4" Oct 29 04:41:45.586212 kubelet[1975]: E1029 04:41:45.586122 1975 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:whisker,Image:ghcr.io/flatcar/calico/whisker:v3.30.4,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:CALICO_VERSION,Value:v3.30.4,ValueFrom:nil,},EnvVar{Name:CLUSTER_ID,Value:97cf41431c4b47fe94ab130b9db85912,ValueFrom:nil,},EnvVar{Name:CLUSTER_TYPE,Value:typha,kdd,k8s,operator,bgp,kubeadm,ValueFrom:nil,},EnvVar{Name:NOTIFICATIONS,Value:Enabled,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kube-api-access-rq4tk,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-7fbcdbccd-mghcv_calico-system(f101f74a-91c5-460d-8026-7c7655b6a631): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.4\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found" logger="UnhandledError" Oct 29 04:41:45.590014 env[1204]: time="2025-10-29T04:41:45.589906105Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\"" Oct 29 04:41:45.932054 env[1204]: time="2025-10-29T04:41:45.931931350Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 29 04:41:45.933728 env[1204]: time="2025-10-29T04:41:45.933597298Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found" Oct 29 04:41:45.934292 kubelet[1975]: E1029 04:41:45.934054 1975 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.4" Oct 29 04:41:45.934292 kubelet[1975]: E1029 04:41:45.934130 1975 kuberuntime_image.go:55] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.4" Oct 29 04:41:45.935372 kubelet[1975]: E1029 04:41:45.934692 1975 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:whisker-backend,Image:ghcr.io/flatcar/calico/whisker-backend:v3.30.4,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:3002,ValueFrom:nil,},EnvVar{Name:GOLDMANE_HOST,Value:goldmane.calico-system.svc.cluster.local:7443,ValueFrom:nil,},EnvVar{Name:TLS_CERT_PATH,Value:/whisker-backend-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:TLS_KEY_PATH,Value:/whisker-backend-key-pair/tls.key,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:whisker-backend-key-pair,ReadOnly:true,MountPath:/whisker-backend-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:whisker-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-rq4tk,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-7fbcdbccd-mghcv_calico-system(f101f74a-91c5-460d-8026-7c7655b6a631): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found" logger="UnhandledError" Oct 29 04:41:45.936313 kubelet[1975]: E1029 04:41:45.936237 1975 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found\", failed to \"StartContainer\" for \"whisker-backend\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found\"]" pod="calico-system/whisker-7fbcdbccd-mghcv" podUID="f101f74a-91c5-460d-8026-7c7655b6a631" Oct 29 04:41:51.249034 env[1204]: time="2025-10-29T04:41:51.248949371Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\"" Oct 29 04:41:51.560076 env[1204]: time="2025-10-29T04:41:51.559379340Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 29 04:41:51.561479 env[1204]: time="2025-10-29T04:41:51.561150745Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" Oct 29 04:41:51.561787 kubelet[1975]: E1029 04:41:51.561706 1975 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Oct 29 04:41:51.562436 kubelet[1975]: E1029 04:41:51.561825 1975 kuberuntime_image.go:55] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Oct 29 04:41:51.562436 kubelet[1975]: E1029 04:41:51.562093 1975 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.30.4,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:LOG_LEVEL,Value:info,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-vfjnd,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/readyz,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod calico-apiserver-66b476d74-9x56r_calico-apiserver(c55cf193-f032-43fb-94cc-3208d0f6de96): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" logger="UnhandledError" Oct 29 04:41:51.564153 kubelet[1975]: E1029 04:41:51.564045 1975 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-66b476d74-9x56r" podUID="c55cf193-f032-43fb-94cc-3208d0f6de96" Oct 29 04:41:54.246043 env[1204]: time="2025-10-29T04:41:54.245963827Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\"" Oct 29 04:41:54.570126 env[1204]: time="2025-10-29T04:41:54.569926131Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 29 04:41:54.571284 env[1204]: time="2025-10-29T04:41:54.571226039Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" Oct 29 04:41:54.571735 kubelet[1975]: E1029 04:41:54.571658 1975 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Oct 29 04:41:54.572227 kubelet[1975]: E1029 04:41:54.571751 1975 kuberuntime_image.go:55] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Oct 29 04:41:54.572816 kubelet[1975]: E1029 04:41:54.572719 1975 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.30.4,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:LOG_LEVEL,Value:info,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-2j29h,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/readyz,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod calico-apiserver-66b476d74-xnzfh_calico-apiserver(9af229d2-d1e1-477e-9280-265e378cba4b): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" logger="UnhandledError" Oct 29 04:41:54.574053 kubelet[1975]: E1029 04:41:54.573986 1975 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-66b476d74-xnzfh" podUID="9af229d2-d1e1-477e-9280-265e378cba4b" Oct 29 04:41:55.808280 systemd[1]: run-containerd-runc-k8s.io-718f1414e59e15bf8d5f3cfb5462f3988d8530a53845c908ed2f1a8a59917d5e-runc.LDich5.mount: Deactivated successfully. Oct 29 04:41:56.247179 kubelet[1975]: E1029 04:41:56.247119 1975 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found\"" pod="calico-system/goldmane-666569f655-w7zrh" podUID="4809fb25-1663-4bc2-b12f-599470e2bb91" Oct 29 04:41:56.252968 kubelet[1975]: E1029 04:41:56.252911 1975 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-d8hbp" podUID="78135185-6b36-431d-89d1-d452e0f3a516" Oct 29 04:41:57.979000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.230.43.230:22-147.75.109.163:57824 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:57.994594 kernel: kauditd_printk_skb: 59 callbacks suppressed Oct 29 04:41:57.994898 kernel: audit: type=1130 audit(1761712917.979:1348): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.230.43.230:22-147.75.109.163:57824 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:41:57.981065 systemd[1]: Started sshd@9-10.230.43.230:22-147.75.109.163:57824.service. Oct 29 04:41:58.961000 audit[4434]: USER_ACCT pid=4434 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:41:58.965839 sshd[4434]: Accepted publickey for core from 147.75.109.163 port 57824 ssh2: RSA SHA256:ZzxZ37pC6YJySS9q7Vi2CaqOM6Jn/4IZMTu+T8q4mXw Oct 29 04:41:58.972615 kernel: audit: type=1101 audit(1761712918.961:1349): pid=4434 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:41:58.974677 sshd[4434]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 29 04:41:58.981816 kernel: audit: type=1103 audit(1761712918.972:1350): pid=4434 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:41:58.972000 audit[4434]: CRED_ACQ pid=4434 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:41:58.993580 kernel: audit: type=1006 audit(1761712918.972:1351): pid=4434 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=8 res=1 Oct 29 04:41:58.994144 systemd-logind[1188]: New session 8 of user core. Oct 29 04:41:58.997420 systemd[1]: Started session-8.scope. Oct 29 04:41:58.972000 audit[4434]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffaacffc10 a2=3 a3=0 items=0 ppid=1 pid=4434 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:59.006075 kernel: audit: type=1300 audit(1761712918.972:1351): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffaacffc10 a2=3 a3=0 items=0 ppid=1 pid=4434 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:41:58.972000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 29 04:41:59.013627 kernel: audit: type=1327 audit(1761712918.972:1351): proctitle=737368643A20636F7265205B707269765D Oct 29 04:41:59.016000 audit[4434]: USER_START pid=4434 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:41:59.025630 kernel: audit: type=1105 audit(1761712919.016:1352): pid=4434 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:41:59.025000 audit[4439]: CRED_ACQ pid=4439 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:41:59.032723 kernel: audit: type=1103 audit(1761712919.025:1353): pid=4439 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:41:59.255584 kubelet[1975]: E1029 04:41:59.254302 1975 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-kube-controllers\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found\"" pod="calico-system/calico-kube-controllers-76dd6544c7-psclk" podUID="7c4e2a15-2feb-448f-b8ed-a786076858ec" Oct 29 04:42:00.302025 sshd[4434]: pam_unix(sshd:session): session closed for user core Oct 29 04:42:00.318123 kernel: audit: type=1106 audit(1761712920.304:1354): pid=4434 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:42:00.304000 audit[4434]: USER_END pid=4434 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:42:00.316242 systemd[1]: sshd@9-10.230.43.230:22-147.75.109.163:57824.service: Deactivated successfully. Oct 29 04:42:00.319318 systemd[1]: session-8.scope: Deactivated successfully. Oct 29 04:42:00.323766 systemd-logind[1188]: Session 8 logged out. Waiting for processes to exit. Oct 29 04:42:00.325689 systemd-logind[1188]: Removed session 8. Oct 29 04:42:00.304000 audit[4434]: CRED_DISP pid=4434 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:42:00.332634 kernel: audit: type=1104 audit(1761712920.304:1355): pid=4434 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:42:00.316000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.230.43.230:22-147.75.109.163:57824 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:42:01.251556 kubelet[1975]: E1029 04:42:01.251249 1975 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found\"]" pod="calico-system/whisker-7fbcdbccd-mghcv" podUID="f101f74a-91c5-460d-8026-7c7655b6a631" Oct 29 04:42:01.797383 systemd[1]: Started sshd@10-10.230.43.230:22-178.128.241.223:43934.service. Oct 29 04:42:01.797000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.230.43.230:22-178.128.241.223:43934 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:42:01.918552 sshd[4450]: Invalid user admin from 178.128.241.223 port 43934 Oct 29 04:42:01.946716 sshd[4450]: pam_faillock(sshd:auth): User unknown Oct 29 04:42:01.947769 sshd[4450]: pam_unix(sshd:auth): check pass; user unknown Oct 29 04:42:01.947846 sshd[4450]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.241.223 Oct 29 04:42:01.948562 sshd[4450]: pam_faillock(sshd:auth): User unknown Oct 29 04:42:01.948000 audit[4450]: USER_AUTH pid=4450 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="admin" exe="/usr/sbin/sshd" hostname=178.128.241.223 addr=178.128.241.223 terminal=ssh res=failed' Oct 29 04:42:02.246314 kubelet[1975]: E1029 04:42:02.246253 1975 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-66b476d74-9x56r" podUID="c55cf193-f032-43fb-94cc-3208d0f6de96" Oct 29 04:42:03.827203 sshd[4450]: Failed password for invalid user admin from 178.128.241.223 port 43934 ssh2 Oct 29 04:42:04.119075 sshd[4450]: Connection closed by invalid user admin 178.128.241.223 port 43934 [preauth] Oct 29 04:42:04.120918 systemd[1]: sshd@10-10.230.43.230:22-178.128.241.223:43934.service: Deactivated successfully. Oct 29 04:42:04.119000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.230.43.230:22-178.128.241.223:43934 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:42:04.129423 kernel: kauditd_printk_skb: 3 callbacks suppressed Oct 29 04:42:04.130247 kernel: audit: type=1131 audit(1761712924.119:1359): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.230.43.230:22-178.128.241.223:43934 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:42:05.464790 systemd[1]: Started sshd@11-10.230.43.230:22-147.75.109.163:47812.service. Oct 29 04:42:05.463000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.230.43.230:22-147.75.109.163:47812 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:42:05.474632 kernel: audit: type=1130 audit(1761712925.463:1360): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.230.43.230:22-147.75.109.163:47812 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:42:06.365000 audit[4458]: USER_ACCT pid=4458 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:42:06.377423 sshd[4458]: Accepted publickey for core from 147.75.109.163 port 47812 ssh2: RSA SHA256:ZzxZ37pC6YJySS9q7Vi2CaqOM6Jn/4IZMTu+T8q4mXw Oct 29 04:42:06.378299 kernel: audit: type=1101 audit(1761712926.365:1361): pid=4458 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:42:06.379508 sshd[4458]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 29 04:42:06.376000 audit[4458]: CRED_ACQ pid=4458 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:42:06.395180 kernel: audit: type=1103 audit(1761712926.376:1362): pid=4458 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:42:06.395374 kernel: audit: type=1006 audit(1761712926.376:1363): pid=4458 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=9 res=1 Oct 29 04:42:06.396748 kernel: audit: type=1300 audit(1761712926.376:1363): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc8721d3c0 a2=3 a3=0 items=0 ppid=1 pid=4458 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:06.376000 audit[4458]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc8721d3c0 a2=3 a3=0 items=0 ppid=1 pid=4458 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:06.404049 kernel: audit: type=1327 audit(1761712926.376:1363): proctitle=737368643A20636F7265205B707269765D Oct 29 04:42:06.376000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 29 04:42:06.410367 systemd-logind[1188]: New session 9 of user core. Oct 29 04:42:06.413288 systemd[1]: Started session-9.scope. Oct 29 04:42:06.423000 audit[4458]: USER_START pid=4458 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:42:06.447628 kernel: audit: type=1105 audit(1761712926.423:1364): pid=4458 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:42:06.448405 kernel: audit: type=1103 audit(1761712926.445:1365): pid=4460 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:42:06.445000 audit[4460]: CRED_ACQ pid=4460 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:42:07.253018 kubelet[1975]: E1029 04:42:07.252890 1975 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-66b476d74-xnzfh" podUID="9af229d2-d1e1-477e-9280-265e378cba4b" Oct 29 04:42:07.308619 sshd[4458]: pam_unix(sshd:session): session closed for user core Oct 29 04:42:07.309000 audit[4458]: USER_END pid=4458 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:42:07.318795 kernel: audit: type=1106 audit(1761712927.309:1366): pid=4458 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:42:07.316000 audit[4458]: CRED_DISP pid=4458 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:42:07.321002 systemd[1]: sshd@11-10.230.43.230:22-147.75.109.163:47812.service: Deactivated successfully. Oct 29 04:42:07.319000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.230.43.230:22-147.75.109.163:47812 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:42:07.323066 systemd[1]: session-9.scope: Deactivated successfully. Oct 29 04:42:07.323077 systemd-logind[1188]: Session 9 logged out. Waiting for processes to exit. Oct 29 04:42:07.325079 systemd-logind[1188]: Removed session 9. Oct 29 04:42:11.264919 env[1204]: time="2025-10-29T04:42:11.263911051Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.4\"" Oct 29 04:42:11.595703 env[1204]: time="2025-10-29T04:42:11.595363528Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 29 04:42:11.597207 env[1204]: time="2025-10-29T04:42:11.597067157Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" Oct 29 04:42:11.599273 kubelet[1975]: E1029 04:42:11.599152 1975 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" image="ghcr.io/flatcar/calico/csi:v3.30.4" Oct 29 04:42:11.599989 kubelet[1975]: E1029 04:42:11.599375 1975 kuberuntime_image.go:55] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" image="ghcr.io/flatcar/calico/csi:v3.30.4" Oct 29 04:42:11.601020 kubelet[1975]: E1029 04:42:11.600927 1975 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.30.4,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-h67bl,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*true,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:*false,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*true,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-d8hbp_calico-system(78135185-6b36-431d-89d1-d452e0f3a516): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" logger="UnhandledError" Oct 29 04:42:11.603842 env[1204]: time="2025-10-29T04:42:11.603790425Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\"" Oct 29 04:42:11.968685 env[1204]: time="2025-10-29T04:42:11.968572398Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 29 04:42:11.970221 env[1204]: time="2025-10-29T04:42:11.970156026Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" Oct 29 04:42:11.970821 kubelet[1975]: E1029 04:42:11.970748 1975 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4" Oct 29 04:42:11.971096 kubelet[1975]: E1029 04:42:11.971032 1975 kuberuntime_image.go:55] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4" Oct 29 04:42:11.971567 kubelet[1975]: E1029 04:42:11.971487 1975 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-h67bl,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*true,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:*false,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*true,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-d8hbp_calico-system(78135185-6b36-431d-89d1-d452e0f3a516): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" logger="UnhandledError" Oct 29 04:42:11.973723 kubelet[1975]: E1029 04:42:11.973646 1975 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-d8hbp" podUID="78135185-6b36-431d-89d1-d452e0f3a516" Oct 29 04:42:12.248211 env[1204]: time="2025-10-29T04:42:12.246934589Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.4\"" Oct 29 04:42:12.473408 kernel: kauditd_printk_skb: 2 callbacks suppressed Oct 29 04:42:12.474032 kernel: audit: type=1130 audit(1761712932.465:1369): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.230.43.230:22-147.75.109.163:39076 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:42:12.465000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.230.43.230:22-147.75.109.163:39076 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:42:12.465566 systemd[1]: Started sshd@12-10.230.43.230:22-147.75.109.163:39076.service. Oct 29 04:42:12.558473 env[1204]: time="2025-10-29T04:42:12.557923067Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 29 04:42:12.560774 env[1204]: time="2025-10-29T04:42:12.560547040Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found" Oct 29 04:42:12.561286 kubelet[1975]: E1029 04:42:12.561177 1975 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found" image="ghcr.io/flatcar/calico/goldmane:v3.30.4" Oct 29 04:42:12.561410 kubelet[1975]: E1029 04:42:12.561309 1975 kuberuntime_image.go:55] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found" image="ghcr.io/flatcar/calico/goldmane:v3.30.4" Oct 29 04:42:12.561814 kubelet[1975]: E1029 04:42:12.561712 1975 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:goldmane,Image:ghcr.io/flatcar/calico/goldmane:v3.30.4,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:7443,ValueFrom:nil,},EnvVar{Name:SERVER_CERT_PATH,Value:/goldmane-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:SERVER_KEY_PATH,Value:/goldmane-key-pair/tls.key,ValueFrom:nil,},EnvVar{Name:CA_CERT_PATH,Value:/etc/pki/tls/certs/tigera-ca-bundle.crt,ValueFrom:nil,},EnvVar{Name:PUSH_URL,Value:https://guardian.calico-system.svc.cluster.local:443/api/v1/flows/bulk,ValueFrom:nil,},EnvVar{Name:FILE_CONFIG_PATH,Value:/config/config.json,ValueFrom:nil,},EnvVar{Name:HEALTH_ENABLED,Value:true,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:config,ReadOnly:true,MountPath:/config,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-key-pair,ReadOnly:true,MountPath:/goldmane-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-zbz8q,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -live],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -ready],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:30,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod goldmane-666569f655-w7zrh_calico-system(4809fb25-1663-4bc2-b12f-599470e2bb91): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found" logger="UnhandledError" Oct 29 04:42:12.562953 kubelet[1975]: E1029 04:42:12.562888 1975 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found\"" pod="calico-system/goldmane-666569f655-w7zrh" podUID="4809fb25-1663-4bc2-b12f-599470e2bb91" Oct 29 04:42:13.250042 env[1204]: time="2025-10-29T04:42:13.249275042Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.4\"" Oct 29 04:42:13.394000 audit[4480]: USER_ACCT pid=4480 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:42:13.409357 kernel: audit: type=1101 audit(1761712933.394:1370): pid=4480 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:42:13.409519 kernel: audit: type=1103 audit(1761712933.401:1371): pid=4480 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:42:13.401000 audit[4480]: CRED_ACQ pid=4480 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:42:13.409753 sshd[4480]: Accepted publickey for core from 147.75.109.163 port 39076 ssh2: RSA SHA256:ZzxZ37pC6YJySS9q7Vi2CaqOM6Jn/4IZMTu+T8q4mXw Oct 29 04:42:13.402947 sshd[4480]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 29 04:42:13.434866 kernel: audit: type=1006 audit(1761712933.401:1372): pid=4480 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Oct 29 04:42:13.435106 kernel: audit: type=1300 audit(1761712933.401:1372): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc20be2a00 a2=3 a3=0 items=0 ppid=1 pid=4480 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:13.401000 audit[4480]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc20be2a00 a2=3 a3=0 items=0 ppid=1 pid=4480 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:13.426958 systemd[1]: Started session-10.scope. Oct 29 04:42:13.439941 systemd-logind[1188]: New session 10 of user core. Oct 29 04:42:13.401000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 29 04:42:13.450639 kernel: audit: type=1327 audit(1761712933.401:1372): proctitle=737368643A20636F7265205B707269765D Oct 29 04:42:13.452000 audit[4480]: USER_START pid=4480 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:42:13.462920 kernel: audit: type=1105 audit(1761712933.452:1373): pid=4480 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:42:13.462000 audit[4482]: CRED_ACQ pid=4482 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:42:13.470654 kernel: audit: type=1103 audit(1761712933.462:1374): pid=4482 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:42:13.571271 env[1204]: time="2025-10-29T04:42:13.570485875Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 29 04:42:13.573133 env[1204]: time="2025-10-29T04:42:13.572678002Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.4\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found" Oct 29 04:42:13.573655 kubelet[1975]: E1029 04:42:13.573544 1975 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.4\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found" image="ghcr.io/flatcar/calico/whisker:v3.30.4" Oct 29 04:42:13.574179 kubelet[1975]: E1029 04:42:13.573696 1975 kuberuntime_image.go:55] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.4\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found" image="ghcr.io/flatcar/calico/whisker:v3.30.4" Oct 29 04:42:13.574179 kubelet[1975]: E1029 04:42:13.573936 1975 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:whisker,Image:ghcr.io/flatcar/calico/whisker:v3.30.4,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:CALICO_VERSION,Value:v3.30.4,ValueFrom:nil,},EnvVar{Name:CLUSTER_ID,Value:97cf41431c4b47fe94ab130b9db85912,ValueFrom:nil,},EnvVar{Name:CLUSTER_TYPE,Value:typha,kdd,k8s,operator,bgp,kubeadm,ValueFrom:nil,},EnvVar{Name:NOTIFICATIONS,Value:Enabled,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kube-api-access-rq4tk,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-7fbcdbccd-mghcv_calico-system(f101f74a-91c5-460d-8026-7c7655b6a631): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.4\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found" logger="UnhandledError" Oct 29 04:42:13.577627 env[1204]: time="2025-10-29T04:42:13.577303145Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\"" Oct 29 04:42:13.900610 env[1204]: time="2025-10-29T04:42:13.900499587Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 29 04:42:13.902245 env[1204]: time="2025-10-29T04:42:13.902184350Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found" Oct 29 04:42:13.904520 kubelet[1975]: E1029 04:42:13.904446 1975 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.4" Oct 29 04:42:13.908665 kubelet[1975]: E1029 04:42:13.908623 1975 kuberuntime_image.go:55] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.4" Oct 29 04:42:13.909690 kubelet[1975]: E1029 04:42:13.909581 1975 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:whisker-backend,Image:ghcr.io/flatcar/calico/whisker-backend:v3.30.4,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:3002,ValueFrom:nil,},EnvVar{Name:GOLDMANE_HOST,Value:goldmane.calico-system.svc.cluster.local:7443,ValueFrom:nil,},EnvVar{Name:TLS_CERT_PATH,Value:/whisker-backend-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:TLS_KEY_PATH,Value:/whisker-backend-key-pair/tls.key,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:whisker-backend-key-pair,ReadOnly:true,MountPath:/whisker-backend-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:whisker-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-rq4tk,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-7fbcdbccd-mghcv_calico-system(f101f74a-91c5-460d-8026-7c7655b6a631): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found" logger="UnhandledError" Oct 29 04:42:13.911192 kubelet[1975]: E1029 04:42:13.911131 1975 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found\", failed to \"StartContainer\" for \"whisker-backend\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found\"]" pod="calico-system/whisker-7fbcdbccd-mghcv" podUID="f101f74a-91c5-460d-8026-7c7655b6a631" Oct 29 04:42:14.218770 sshd[4480]: pam_unix(sshd:session): session closed for user core Oct 29 04:42:14.222000 audit[4480]: USER_END pid=4480 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:42:14.230625 kernel: audit: type=1106 audit(1761712934.222:1375): pid=4480 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:42:14.232129 systemd[1]: sshd@12-10.230.43.230:22-147.75.109.163:39076.service: Deactivated successfully. Oct 29 04:42:14.234786 systemd[1]: session-10.scope: Deactivated successfully. Oct 29 04:42:14.236115 systemd-logind[1188]: Session 10 logged out. Waiting for processes to exit. Oct 29 04:42:14.239066 systemd-logind[1188]: Removed session 10. Oct 29 04:42:14.223000 audit[4480]: CRED_DISP pid=4480 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:42:14.246625 kernel: audit: type=1104 audit(1761712934.223:1376): pid=4480 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:42:14.231000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.230.43.230:22-147.75.109.163:39076 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:42:14.252888 env[1204]: time="2025-10-29T04:42:14.252136603Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\"" Oct 29 04:42:14.380258 systemd[1]: Started sshd@13-10.230.43.230:22-147.75.109.163:39078.service. Oct 29 04:42:14.379000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.230.43.230:22-147.75.109.163:39078 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:42:14.584865 env[1204]: time="2025-10-29T04:42:14.584675999Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 29 04:42:14.586935 env[1204]: time="2025-10-29T04:42:14.586678339Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found" Oct 29 04:42:14.589519 kubelet[1975]: E1029 04:42:14.589369 1975 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found" image="ghcr.io/flatcar/calico/kube-controllers:v3.30.4" Oct 29 04:42:14.590083 kubelet[1975]: E1029 04:42:14.589630 1975 kuberuntime_image.go:55] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found" image="ghcr.io/flatcar/calico/kube-controllers:v3.30.4" Oct 29 04:42:14.590165 kubelet[1975]: E1029 04:42:14.590035 1975 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:calico-kube-controllers,Image:ghcr.io/flatcar/calico/kube-controllers:v3.30.4,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:KUBE_CONTROLLERS_CONFIG_NAME,Value:default,ValueFrom:nil,},EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:ENABLED_CONTROLLERS,Value:node,loadbalancer,ValueFrom:nil,},EnvVar{Name:DISABLE_KUBE_CONTROLLERS_CONFIG_API,Value:false,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:CA_CRT_PATH,Value:/etc/pki/tls/certs/tigera-ca-bundle.crt,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:tigera-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:tigera-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/cert.pem,SubPath:ca-bundle.crt,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-kp7fs,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/usr/bin/check-status -l],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:10,TimeoutSeconds:10,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:6,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/usr/bin/check-status -r],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:10,PeriodSeconds:30,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*999,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod calico-kube-controllers-76dd6544c7-psclk_calico-system(7c4e2a15-2feb-448f-b8ed-a786076858ec): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found" logger="UnhandledError" Oct 29 04:42:14.591290 kubelet[1975]: E1029 04:42:14.591225 1975 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-kube-controllers\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found\"" pod="calico-system/calico-kube-controllers-76dd6544c7-psclk" podUID="7c4e2a15-2feb-448f-b8ed-a786076858ec" Oct 29 04:42:14.591769 env[1204]: time="2025-10-29T04:42:14.591731941Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\"" Oct 29 04:42:14.928996 env[1204]: time="2025-10-29T04:42:14.928893950Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 29 04:42:14.932595 env[1204]: time="2025-10-29T04:42:14.932490605Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" Oct 29 04:42:14.933382 kubelet[1975]: E1029 04:42:14.933296 1975 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Oct 29 04:42:14.933743 kubelet[1975]: E1029 04:42:14.933411 1975 kuberuntime_image.go:55] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Oct 29 04:42:14.933913 kubelet[1975]: E1029 04:42:14.933794 1975 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.30.4,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:LOG_LEVEL,Value:info,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-vfjnd,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/readyz,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod calico-apiserver-66b476d74-9x56r_calico-apiserver(c55cf193-f032-43fb-94cc-3208d0f6de96): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" logger="UnhandledError" Oct 29 04:42:14.935092 kubelet[1975]: E1029 04:42:14.935028 1975 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-66b476d74-9x56r" podUID="c55cf193-f032-43fb-94cc-3208d0f6de96" Oct 29 04:42:15.303000 audit[4493]: USER_ACCT pid=4493 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:42:15.307029 sshd[4493]: Accepted publickey for core from 147.75.109.163 port 39078 ssh2: RSA SHA256:ZzxZ37pC6YJySS9q7Vi2CaqOM6Jn/4IZMTu+T8q4mXw Oct 29 04:42:15.308000 audit[4493]: CRED_ACQ pid=4493 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:42:15.308000 audit[4493]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd50971ec0 a2=3 a3=0 items=0 ppid=1 pid=4493 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:15.308000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 29 04:42:15.311735 sshd[4493]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 29 04:42:15.323073 systemd-logind[1188]: New session 11 of user core. Oct 29 04:42:15.324342 systemd[1]: Started session-11.scope. Oct 29 04:42:15.334000 audit[4493]: USER_START pid=4493 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:42:15.337000 audit[4495]: CRED_ACQ pid=4495 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:42:16.196298 sshd[4493]: pam_unix(sshd:session): session closed for user core Oct 29 04:42:16.197000 audit[4493]: USER_END pid=4493 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:42:16.197000 audit[4493]: CRED_DISP pid=4493 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:42:16.200000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.230.43.230:22-147.75.109.163:39078 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:42:16.201639 systemd[1]: sshd@13-10.230.43.230:22-147.75.109.163:39078.service: Deactivated successfully. Oct 29 04:42:16.203255 systemd[1]: session-11.scope: Deactivated successfully. Oct 29 04:42:16.205436 systemd-logind[1188]: Session 11 logged out. Waiting for processes to exit. Oct 29 04:42:16.207472 systemd-logind[1188]: Removed session 11. Oct 29 04:42:16.344000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.230.43.230:22-147.75.109.163:39088 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:42:16.345882 systemd[1]: Started sshd@14-10.230.43.230:22-147.75.109.163:39088.service. Oct 29 04:42:17.264816 sshd[4503]: Accepted publickey for core from 147.75.109.163 port 39088 ssh2: RSA SHA256:ZzxZ37pC6YJySS9q7Vi2CaqOM6Jn/4IZMTu+T8q4mXw Oct 29 04:42:17.263000 audit[4503]: USER_ACCT pid=4503 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:42:17.264000 audit[4503]: CRED_ACQ pid=4503 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:42:17.264000 audit[4503]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd7607b8e0 a2=3 a3=0 items=0 ppid=1 pid=4503 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:17.264000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 29 04:42:17.267342 sshd[4503]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 29 04:42:17.274711 systemd-logind[1188]: New session 12 of user core. Oct 29 04:42:17.275761 systemd[1]: Started session-12.scope. Oct 29 04:42:17.285000 audit[4503]: USER_START pid=4503 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:42:17.287000 audit[4505]: CRED_ACQ pid=4505 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:42:18.042100 sshd[4503]: pam_unix(sshd:session): session closed for user core Oct 29 04:42:18.054397 kernel: kauditd_printk_skb: 20 callbacks suppressed Oct 29 04:42:18.054655 kernel: audit: type=1106 audit(1761712938.044:1393): pid=4503 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:42:18.044000 audit[4503]: USER_END pid=4503 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:42:18.057799 systemd[1]: sshd@14-10.230.43.230:22-147.75.109.163:39088.service: Deactivated successfully. Oct 29 04:42:18.059053 systemd[1]: session-12.scope: Deactivated successfully. Oct 29 04:42:18.060620 systemd-logind[1188]: Session 12 logged out. Waiting for processes to exit. Oct 29 04:42:18.053000 audit[4503]: CRED_DISP pid=4503 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:42:18.067632 kernel: audit: type=1104 audit(1761712938.053:1394): pid=4503 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:42:18.056000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.230.43.230:22-147.75.109.163:39088 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:42:18.068653 systemd-logind[1188]: Removed session 12. Oct 29 04:42:18.074645 kernel: audit: type=1131 audit(1761712938.056:1395): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.230.43.230:22-147.75.109.163:39088 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:42:21.248437 env[1204]: time="2025-10-29T04:42:21.248226431Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\"" Oct 29 04:42:21.568066 env[1204]: time="2025-10-29T04:42:21.567613870Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 29 04:42:21.572596 env[1204]: time="2025-10-29T04:42:21.572437635Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" Oct 29 04:42:21.573293 kubelet[1975]: E1029 04:42:21.573183 1975 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Oct 29 04:42:21.574508 kubelet[1975]: E1029 04:42:21.574464 1975 kuberuntime_image.go:55] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Oct 29 04:42:21.575154 kubelet[1975]: E1029 04:42:21.575061 1975 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.30.4,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:LOG_LEVEL,Value:info,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-2j29h,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/readyz,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod calico-apiserver-66b476d74-xnzfh_calico-apiserver(9af229d2-d1e1-477e-9280-265e378cba4b): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" logger="UnhandledError" Oct 29 04:42:21.576939 kubelet[1975]: E1029 04:42:21.576873 1975 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-66b476d74-xnzfh" podUID="9af229d2-d1e1-477e-9280-265e378cba4b" Oct 29 04:42:23.196000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.230.43.230:22-147.75.109.163:57908 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:42:23.196813 systemd[1]: Started sshd@15-10.230.43.230:22-147.75.109.163:57908.service. Oct 29 04:42:23.203684 kernel: audit: type=1130 audit(1761712943.196:1396): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.230.43.230:22-147.75.109.163:57908 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:42:23.409000 audit[1862]: AVC avc: denied { watch } for pid=1862 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526395 scontext=system_u:system_r:svirt_lxc_net_t:s0:c163,c778 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 29 04:42:23.416633 kernel: audit: type=1400 audit(1761712943.409:1397): avc: denied { watch } for pid=1862 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526395 scontext=system_u:system_r:svirt_lxc_net_t:s0:c163,c778 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 29 04:42:23.409000 audit[1862]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0017db080 a2=fc6 a3=0 items=0 ppid=1710 pid=1862 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c163,c778 key=(null) Oct 29 04:42:23.429661 kernel: audit: type=1300 audit(1761712943.409:1397): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0017db080 a2=fc6 a3=0 items=0 ppid=1710 pid=1862 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c163,c778 key=(null) Oct 29 04:42:23.409000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 29 04:42:23.437631 kernel: audit: type=1327 audit(1761712943.409:1397): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 29 04:42:23.437822 kernel: audit: type=1400 audit(1761712943.413:1398): avc: denied { watch } for pid=1862 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526389 scontext=system_u:system_r:svirt_lxc_net_t:s0:c163,c778 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 29 04:42:23.413000 audit[1862]: AVC avc: denied { watch } for pid=1862 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526389 scontext=system_u:system_r:svirt_lxc_net_t:s0:c163,c778 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 29 04:42:23.413000 audit[1862]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0013824c0 a2=fc6 a3=0 items=0 ppid=1710 pid=1862 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c163,c778 key=(null) Oct 29 04:42:23.451698 kernel: audit: type=1300 audit(1761712943.413:1398): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0013824c0 a2=fc6 a3=0 items=0 ppid=1710 pid=1862 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c163,c778 key=(null) Oct 29 04:42:23.413000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 29 04:42:23.458471 kernel: audit: type=1327 audit(1761712943.413:1398): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 29 04:42:24.027000 audit[1830]: AVC avc: denied { watch } for pid=1830 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526395 scontext=system_u:system_r:svirt_lxc_net_t:s0:c727,c953 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 29 04:42:24.035098 kernel: audit: type=1400 audit(1761712944.027:1399): avc: denied { watch } for pid=1830 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526395 scontext=system_u:system_r:svirt_lxc_net_t:s0:c727,c953 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 29 04:42:24.027000 audit[1830]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=73 a1=c009bfde30 a2=fc6 a3=0 items=0 ppid=1689 pid=1830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c727,c953 key=(null) Oct 29 04:42:24.050786 kernel: audit: type=1300 audit(1761712944.027:1399): arch=c000003e syscall=254 success=no exit=-13 a0=73 a1=c009bfde30 a2=fc6 a3=0 items=0 ppid=1689 pid=1830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c727,c953 key=(null) Oct 29 04:42:24.050981 kernel: audit: type=1327 audit(1761712944.027:1399): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E34332E323330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 29 04:42:24.027000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E34332E323330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 29 04:42:24.043000 audit[1830]: AVC avc: denied { watch } for pid=1830 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=526391 scontext=system_u:system_r:svirt_lxc_net_t:s0:c727,c953 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 29 04:42:24.043000 audit[1830]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=73 a1=c009bfdf20 a2=fc6 a3=0 items=0 ppid=1689 pid=1830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c727,c953 key=(null) Oct 29 04:42:24.043000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E34332E323330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 29 04:42:24.049000 audit[1830]: AVC avc: denied { watch } for pid=1830 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526395 scontext=system_u:system_r:svirt_lxc_net_t:s0:c727,c953 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 29 04:42:24.049000 audit[1830]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=73 a1=c0096c6510 a2=fc6 a3=0 items=0 ppid=1689 pid=1830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c727,c953 key=(null) Oct 29 04:42:24.049000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E34332E323330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 29 04:42:24.049000 audit[1830]: AVC avc: denied { watch } for pid=1830 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=526397 scontext=system_u:system_r:svirt_lxc_net_t:s0:c727,c953 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 29 04:42:24.049000 audit[1830]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=73 a1=c0096c6540 a2=fc6 a3=0 items=0 ppid=1689 pid=1830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c727,c953 key=(null) Oct 29 04:42:24.049000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E34332E323330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 29 04:42:24.054000 audit[1830]: AVC avc: denied { watch } for pid=1830 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526389 scontext=system_u:system_r:svirt_lxc_net_t:s0:c727,c953 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 29 04:42:24.054000 audit[1830]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=73 a1=c004805380 a2=fc6 a3=0 items=0 ppid=1689 pid=1830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c727,c953 key=(null) Oct 29 04:42:24.054000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E34332E323330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 29 04:42:24.136000 audit[1830]: AVC avc: denied { watch } for pid=1830 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526389 scontext=system_u:system_r:svirt_lxc_net_t:s0:c727,c953 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 29 04:42:24.136000 audit[1830]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=73 a1=c00970bf60 a2=fc6 a3=0 items=0 ppid=1689 pid=1830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c727,c953 key=(null) Oct 29 04:42:24.136000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3233302E34332E323330002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 Oct 29 04:42:24.144000 audit[4517]: USER_ACCT pid=4517 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:42:24.145994 sshd[4517]: Accepted publickey for core from 147.75.109.163 port 57908 ssh2: RSA SHA256:ZzxZ37pC6YJySS9q7Vi2CaqOM6Jn/4IZMTu+T8q4mXw Oct 29 04:42:24.146000 audit[4517]: CRED_ACQ pid=4517 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:42:24.146000 audit[4517]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd4c97edf0 a2=3 a3=0 items=0 ppid=1 pid=4517 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:24.146000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 29 04:42:24.148763 sshd[4517]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 29 04:42:24.159058 systemd-logind[1188]: New session 13 of user core. Oct 29 04:42:24.160725 systemd[1]: Started session-13.scope. Oct 29 04:42:24.175000 audit[4517]: USER_START pid=4517 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:42:24.178000 audit[4519]: CRED_ACQ pid=4519 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:42:24.247776 kubelet[1975]: E1029 04:42:24.247658 1975 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-d8hbp" podUID="78135185-6b36-431d-89d1-d452e0f3a516" Oct 29 04:42:24.989690 sshd[4517]: pam_unix(sshd:session): session closed for user core Oct 29 04:42:24.992000 audit[4517]: USER_END pid=4517 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:42:24.992000 audit[4517]: CRED_DISP pid=4517 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:42:24.995357 systemd[1]: sshd@15-10.230.43.230:22-147.75.109.163:57908.service: Deactivated successfully. Oct 29 04:42:24.995000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.230.43.230:22-147.75.109.163:57908 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:42:24.999536 systemd[1]: session-13.scope: Deactivated successfully. Oct 29 04:42:25.004195 systemd-logind[1188]: Session 13 logged out. Waiting for processes to exit. Oct 29 04:42:25.006191 systemd-logind[1188]: Removed session 13. Oct 29 04:42:25.795570 systemd[1]: run-containerd-runc-k8s.io-718f1414e59e15bf8d5f3cfb5462f3988d8530a53845c908ed2f1a8a59917d5e-runc.RG4hrI.mount: Deactivated successfully. Oct 29 04:42:26.268540 kubelet[1975]: E1029 04:42:26.268394 1975 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found\"" pod="calico-system/goldmane-666569f655-w7zrh" podUID="4809fb25-1663-4bc2-b12f-599470e2bb91" Oct 29 04:42:26.272064 kubelet[1975]: E1029 04:42:26.271995 1975 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-kube-controllers\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found\"" pod="calico-system/calico-kube-controllers-76dd6544c7-psclk" podUID="7c4e2a15-2feb-448f-b8ed-a786076858ec" Oct 29 04:42:27.247678 kubelet[1975]: E1029 04:42:27.247515 1975 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found\"]" pod="calico-system/whisker-7fbcdbccd-mghcv" podUID="f101f74a-91c5-460d-8026-7c7655b6a631" Oct 29 04:42:27.248830 kubelet[1975]: E1029 04:42:27.248792 1975 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-66b476d74-9x56r" podUID="c55cf193-f032-43fb-94cc-3208d0f6de96" Oct 29 04:42:28.456000 audit[1862]: AVC avc: denied { watch } for pid=1862 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526389 scontext=system_u:system_r:svirt_lxc_net_t:s0:c163,c778 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 29 04:42:28.460436 kernel: kauditd_printk_skb: 25 callbacks suppressed Oct 29 04:42:28.460653 kernel: audit: type=1400 audit(1761712948.456:1413): avc: denied { watch } for pid=1862 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526389 scontext=system_u:system_r:svirt_lxc_net_t:s0:c163,c778 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 29 04:42:28.456000 audit[1862]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00140d420 a2=fc6 a3=0 items=0 ppid=1710 pid=1862 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c163,c778 key=(null) Oct 29 04:42:28.476038 kernel: audit: type=1300 audit(1761712948.456:1413): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00140d420 a2=fc6 a3=0 items=0 ppid=1710 pid=1862 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c163,c778 key=(null) Oct 29 04:42:28.456000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 29 04:42:28.489380 kernel: audit: type=1327 audit(1761712948.456:1413): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 29 04:42:28.489510 kernel: audit: type=1400 audit(1761712948.457:1414): avc: denied { watch } for pid=1862 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526389 scontext=system_u:system_r:svirt_lxc_net_t:s0:c163,c778 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 29 04:42:28.457000 audit[1862]: AVC avc: denied { watch } for pid=1862 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526389 scontext=system_u:system_r:svirt_lxc_net_t:s0:c163,c778 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 29 04:42:28.457000 audit[1862]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0013fc2c0 a2=fc6 a3=0 items=0 ppid=1710 pid=1862 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c163,c778 key=(null) Oct 29 04:42:28.497685 kernel: audit: type=1300 audit(1761712948.457:1414): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0013fc2c0 a2=fc6 a3=0 items=0 ppid=1710 pid=1862 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c163,c778 key=(null) Oct 29 04:42:28.457000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 29 04:42:28.510977 kernel: audit: type=1327 audit(1761712948.457:1414): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 29 04:42:28.511145 kernel: audit: type=1400 audit(1761712948.459:1415): avc: denied { watch } for pid=1862 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526389 scontext=system_u:system_r:svirt_lxc_net_t:s0:c163,c778 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 29 04:42:28.459000 audit[1862]: AVC avc: denied { watch } for pid=1862 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526389 scontext=system_u:system_r:svirt_lxc_net_t:s0:c163,c778 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 29 04:42:28.519337 kernel: audit: type=1300 audit(1761712948.459:1415): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00140d440 a2=fc6 a3=0 items=0 ppid=1710 pid=1862 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c163,c778 key=(null) Oct 29 04:42:28.459000 audit[1862]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00140d440 a2=fc6 a3=0 items=0 ppid=1710 pid=1862 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c163,c778 key=(null) Oct 29 04:42:28.459000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 29 04:42:28.532387 kernel: audit: type=1327 audit(1761712948.459:1415): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 29 04:42:28.532526 kernel: audit: type=1400 audit(1761712948.459:1416): avc: denied { watch } for pid=1862 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526389 scontext=system_u:system_r:svirt_lxc_net_t:s0:c163,c778 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 29 04:42:28.459000 audit[1862]: AVC avc: denied { watch } for pid=1862 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526389 scontext=system_u:system_r:svirt_lxc_net_t:s0:c163,c778 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Oct 29 04:42:28.459000 audit[1862]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0013fc2e0 a2=fc6 a3=0 items=0 ppid=1710 pid=1862 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c163,c778 key=(null) Oct 29 04:42:28.459000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Oct 29 04:42:30.148437 systemd[1]: Started sshd@16-10.230.43.230:22-147.75.109.163:57916.service. Oct 29 04:42:30.148000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.230.43.230:22-147.75.109.163:57916 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:42:30.278009 env[1204]: time="2025-10-29T04:42:30.277879967Z" level=info msg="StopPodSandbox for \"818044961d5e8b93ed26f933b4aeb46a7e4f17d66029e564ee97f0fbc4f7b009\"" Oct 29 04:42:30.741706 env[1204]: 2025-10-29 04:42:30.493 [WARNING][4571] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="818044961d5e8b93ed26f933b4aeb46a7e4f17d66029e564ee97f0fbc4f7b009" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--jtkau.gb1.brightbox.com-k8s-calico--apiserver--66b476d74--xnzfh-eth0", GenerateName:"calico-apiserver-66b476d74-", Namespace:"calico-apiserver", SelfLink:"", UID:"9af229d2-d1e1-477e-9280-265e378cba4b", ResourceVersion:"1333", Generation:0, CreationTimestamp:time.Date(2025, time.October, 29, 4, 40, 47, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"66b476d74", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-jtkau.gb1.brightbox.com", ContainerID:"9457e3ff8c4289d1e10d69786716385759af5971be3536c9639186102edd06a7", Pod:"calico-apiserver-66b476d74-xnzfh", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.110.199/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali21bbec9fe5c", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 29 04:42:30.741706 env[1204]: 2025-10-29 04:42:30.496 [INFO][4571] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="818044961d5e8b93ed26f933b4aeb46a7e4f17d66029e564ee97f0fbc4f7b009" Oct 29 04:42:30.741706 env[1204]: 2025-10-29 04:42:30.496 [INFO][4571] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="818044961d5e8b93ed26f933b4aeb46a7e4f17d66029e564ee97f0fbc4f7b009" iface="eth0" netns="" Oct 29 04:42:30.741706 env[1204]: 2025-10-29 04:42:30.496 [INFO][4571] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="818044961d5e8b93ed26f933b4aeb46a7e4f17d66029e564ee97f0fbc4f7b009" Oct 29 04:42:30.741706 env[1204]: 2025-10-29 04:42:30.496 [INFO][4571] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="818044961d5e8b93ed26f933b4aeb46a7e4f17d66029e564ee97f0fbc4f7b009" Oct 29 04:42:30.741706 env[1204]: 2025-10-29 04:42:30.693 [INFO][4578] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="818044961d5e8b93ed26f933b4aeb46a7e4f17d66029e564ee97f0fbc4f7b009" HandleID="k8s-pod-network.818044961d5e8b93ed26f933b4aeb46a7e4f17d66029e564ee97f0fbc4f7b009" Workload="srv--jtkau.gb1.brightbox.com-k8s-calico--apiserver--66b476d74--xnzfh-eth0" Oct 29 04:42:30.741706 env[1204]: 2025-10-29 04:42:30.706 [INFO][4578] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 29 04:42:30.741706 env[1204]: 2025-10-29 04:42:30.707 [INFO][4578] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 29 04:42:30.741706 env[1204]: 2025-10-29 04:42:30.731 [WARNING][4578] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="818044961d5e8b93ed26f933b4aeb46a7e4f17d66029e564ee97f0fbc4f7b009" HandleID="k8s-pod-network.818044961d5e8b93ed26f933b4aeb46a7e4f17d66029e564ee97f0fbc4f7b009" Workload="srv--jtkau.gb1.brightbox.com-k8s-calico--apiserver--66b476d74--xnzfh-eth0" Oct 29 04:42:30.741706 env[1204]: 2025-10-29 04:42:30.731 [INFO][4578] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="818044961d5e8b93ed26f933b4aeb46a7e4f17d66029e564ee97f0fbc4f7b009" HandleID="k8s-pod-network.818044961d5e8b93ed26f933b4aeb46a7e4f17d66029e564ee97f0fbc4f7b009" Workload="srv--jtkau.gb1.brightbox.com-k8s-calico--apiserver--66b476d74--xnzfh-eth0" Oct 29 04:42:30.741706 env[1204]: 2025-10-29 04:42:30.734 [INFO][4578] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 29 04:42:30.741706 env[1204]: 2025-10-29 04:42:30.738 [INFO][4571] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="818044961d5e8b93ed26f933b4aeb46a7e4f17d66029e564ee97f0fbc4f7b009" Oct 29 04:42:30.743321 env[1204]: time="2025-10-29T04:42:30.743267111Z" level=info msg="TearDown network for sandbox \"818044961d5e8b93ed26f933b4aeb46a7e4f17d66029e564ee97f0fbc4f7b009\" successfully" Oct 29 04:42:30.743489 env[1204]: time="2025-10-29T04:42:30.743458877Z" level=info msg="StopPodSandbox for \"818044961d5e8b93ed26f933b4aeb46a7e4f17d66029e564ee97f0fbc4f7b009\" returns successfully" Oct 29 04:42:30.750708 env[1204]: time="2025-10-29T04:42:30.750640282Z" level=info msg="RemovePodSandbox for \"818044961d5e8b93ed26f933b4aeb46a7e4f17d66029e564ee97f0fbc4f7b009\"" Oct 29 04:42:30.750893 env[1204]: time="2025-10-29T04:42:30.750719591Z" level=info msg="Forcibly stopping sandbox \"818044961d5e8b93ed26f933b4aeb46a7e4f17d66029e564ee97f0fbc4f7b009\"" Oct 29 04:42:30.944237 env[1204]: 2025-10-29 04:42:30.860 [WARNING][4592] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="818044961d5e8b93ed26f933b4aeb46a7e4f17d66029e564ee97f0fbc4f7b009" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--jtkau.gb1.brightbox.com-k8s-calico--apiserver--66b476d74--xnzfh-eth0", GenerateName:"calico-apiserver-66b476d74-", Namespace:"calico-apiserver", SelfLink:"", UID:"9af229d2-d1e1-477e-9280-265e378cba4b", ResourceVersion:"1333", Generation:0, CreationTimestamp:time.Date(2025, time.October, 29, 4, 40, 47, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"66b476d74", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-jtkau.gb1.brightbox.com", ContainerID:"9457e3ff8c4289d1e10d69786716385759af5971be3536c9639186102edd06a7", Pod:"calico-apiserver-66b476d74-xnzfh", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.110.199/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali21bbec9fe5c", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 29 04:42:30.944237 env[1204]: 2025-10-29 04:42:30.860 [INFO][4592] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="818044961d5e8b93ed26f933b4aeb46a7e4f17d66029e564ee97f0fbc4f7b009" Oct 29 04:42:30.944237 env[1204]: 2025-10-29 04:42:30.860 [INFO][4592] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="818044961d5e8b93ed26f933b4aeb46a7e4f17d66029e564ee97f0fbc4f7b009" iface="eth0" netns="" Oct 29 04:42:30.944237 env[1204]: 2025-10-29 04:42:30.860 [INFO][4592] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="818044961d5e8b93ed26f933b4aeb46a7e4f17d66029e564ee97f0fbc4f7b009" Oct 29 04:42:30.944237 env[1204]: 2025-10-29 04:42:30.860 [INFO][4592] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="818044961d5e8b93ed26f933b4aeb46a7e4f17d66029e564ee97f0fbc4f7b009" Oct 29 04:42:30.944237 env[1204]: 2025-10-29 04:42:30.914 [INFO][4600] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="818044961d5e8b93ed26f933b4aeb46a7e4f17d66029e564ee97f0fbc4f7b009" HandleID="k8s-pod-network.818044961d5e8b93ed26f933b4aeb46a7e4f17d66029e564ee97f0fbc4f7b009" Workload="srv--jtkau.gb1.brightbox.com-k8s-calico--apiserver--66b476d74--xnzfh-eth0" Oct 29 04:42:30.944237 env[1204]: 2025-10-29 04:42:30.914 [INFO][4600] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 29 04:42:30.944237 env[1204]: 2025-10-29 04:42:30.914 [INFO][4600] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 29 04:42:30.944237 env[1204]: 2025-10-29 04:42:30.935 [WARNING][4600] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="818044961d5e8b93ed26f933b4aeb46a7e4f17d66029e564ee97f0fbc4f7b009" HandleID="k8s-pod-network.818044961d5e8b93ed26f933b4aeb46a7e4f17d66029e564ee97f0fbc4f7b009" Workload="srv--jtkau.gb1.brightbox.com-k8s-calico--apiserver--66b476d74--xnzfh-eth0" Oct 29 04:42:30.944237 env[1204]: 2025-10-29 04:42:30.935 [INFO][4600] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="818044961d5e8b93ed26f933b4aeb46a7e4f17d66029e564ee97f0fbc4f7b009" HandleID="k8s-pod-network.818044961d5e8b93ed26f933b4aeb46a7e4f17d66029e564ee97f0fbc4f7b009" Workload="srv--jtkau.gb1.brightbox.com-k8s-calico--apiserver--66b476d74--xnzfh-eth0" Oct 29 04:42:30.944237 env[1204]: 2025-10-29 04:42:30.937 [INFO][4600] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 29 04:42:30.944237 env[1204]: 2025-10-29 04:42:30.940 [INFO][4592] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="818044961d5e8b93ed26f933b4aeb46a7e4f17d66029e564ee97f0fbc4f7b009" Oct 29 04:42:30.945775 env[1204]: time="2025-10-29T04:42:30.944264889Z" level=info msg="TearDown network for sandbox \"818044961d5e8b93ed26f933b4aeb46a7e4f17d66029e564ee97f0fbc4f7b009\" successfully" Oct 29 04:42:30.952656 env[1204]: time="2025-10-29T04:42:30.952583153Z" level=info msg="RemovePodSandbox \"818044961d5e8b93ed26f933b4aeb46a7e4f17d66029e564ee97f0fbc4f7b009\" returns successfully" Oct 29 04:42:30.973919 env[1204]: time="2025-10-29T04:42:30.973849653Z" level=info msg="StopPodSandbox for \"88d9253440278e9e8c1a4e68f7af94c4f9992df0826ca49cf0f4efe7518bc226\"" Oct 29 04:42:31.120000 audit[4559]: USER_ACCT pid=4559 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:42:31.124954 sshd[4559]: Accepted publickey for core from 147.75.109.163 port 57916 ssh2: RSA SHA256:ZzxZ37pC6YJySS9q7Vi2CaqOM6Jn/4IZMTu+T8q4mXw Oct 29 04:42:31.128000 audit[4559]: CRED_ACQ pid=4559 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:42:31.128000 audit[4559]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc11e0ec00 a2=3 a3=0 items=0 ppid=1 pid=4559 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:31.128000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 29 04:42:31.129813 sshd[4559]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 29 04:42:31.149337 systemd-logind[1188]: New session 14 of user core. Oct 29 04:42:31.150989 systemd[1]: Started session-14.scope. Oct 29 04:42:31.163199 env[1204]: 2025-10-29 04:42:31.035 [WARNING][4618] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="88d9253440278e9e8c1a4e68f7af94c4f9992df0826ca49cf0f4efe7518bc226" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--jtkau.gb1.brightbox.com-k8s-coredns--668d6bf9bc--gdp2b-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"34882139-256c-45b8-b83c-22ae2a3a6d10", ResourceVersion:"1007", Generation:0, CreationTimestamp:time.Date(2025, time.October, 29, 4, 40, 34, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-jtkau.gb1.brightbox.com", ContainerID:"9028969ee66f77994fc660c40a7c4db9013f760ffa320f2f350dfe2b691cefdc", Pod:"coredns-668d6bf9bc-gdp2b", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.110.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali3adb2a352a9", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 29 04:42:31.163199 env[1204]: 2025-10-29 04:42:31.036 [INFO][4618] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="88d9253440278e9e8c1a4e68f7af94c4f9992df0826ca49cf0f4efe7518bc226" Oct 29 04:42:31.163199 env[1204]: 2025-10-29 04:42:31.036 [INFO][4618] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="88d9253440278e9e8c1a4e68f7af94c4f9992df0826ca49cf0f4efe7518bc226" iface="eth0" netns="" Oct 29 04:42:31.163199 env[1204]: 2025-10-29 04:42:31.036 [INFO][4618] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="88d9253440278e9e8c1a4e68f7af94c4f9992df0826ca49cf0f4efe7518bc226" Oct 29 04:42:31.163199 env[1204]: 2025-10-29 04:42:31.036 [INFO][4618] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="88d9253440278e9e8c1a4e68f7af94c4f9992df0826ca49cf0f4efe7518bc226" Oct 29 04:42:31.163199 env[1204]: 2025-10-29 04:42:31.095 [INFO][4626] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="88d9253440278e9e8c1a4e68f7af94c4f9992df0826ca49cf0f4efe7518bc226" HandleID="k8s-pod-network.88d9253440278e9e8c1a4e68f7af94c4f9992df0826ca49cf0f4efe7518bc226" Workload="srv--jtkau.gb1.brightbox.com-k8s-coredns--668d6bf9bc--gdp2b-eth0" Oct 29 04:42:31.163199 env[1204]: 2025-10-29 04:42:31.096 [INFO][4626] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 29 04:42:31.163199 env[1204]: 2025-10-29 04:42:31.096 [INFO][4626] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 29 04:42:31.163199 env[1204]: 2025-10-29 04:42:31.110 [WARNING][4626] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="88d9253440278e9e8c1a4e68f7af94c4f9992df0826ca49cf0f4efe7518bc226" HandleID="k8s-pod-network.88d9253440278e9e8c1a4e68f7af94c4f9992df0826ca49cf0f4efe7518bc226" Workload="srv--jtkau.gb1.brightbox.com-k8s-coredns--668d6bf9bc--gdp2b-eth0" Oct 29 04:42:31.163199 env[1204]: 2025-10-29 04:42:31.110 [INFO][4626] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="88d9253440278e9e8c1a4e68f7af94c4f9992df0826ca49cf0f4efe7518bc226" HandleID="k8s-pod-network.88d9253440278e9e8c1a4e68f7af94c4f9992df0826ca49cf0f4efe7518bc226" Workload="srv--jtkau.gb1.brightbox.com-k8s-coredns--668d6bf9bc--gdp2b-eth0" Oct 29 04:42:31.163199 env[1204]: 2025-10-29 04:42:31.117 [INFO][4626] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 29 04:42:31.163199 env[1204]: 2025-10-29 04:42:31.153 [INFO][4618] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="88d9253440278e9e8c1a4e68f7af94c4f9992df0826ca49cf0f4efe7518bc226" Oct 29 04:42:31.162000 audit[4559]: USER_START pid=4559 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:42:31.165261 env[1204]: time="2025-10-29T04:42:31.164114747Z" level=info msg="TearDown network for sandbox \"88d9253440278e9e8c1a4e68f7af94c4f9992df0826ca49cf0f4efe7518bc226\" successfully" Oct 29 04:42:31.165261 env[1204]: time="2025-10-29T04:42:31.164184595Z" level=info msg="StopPodSandbox for \"88d9253440278e9e8c1a4e68f7af94c4f9992df0826ca49cf0f4efe7518bc226\" returns successfully" Oct 29 04:42:31.165000 audit[4632]: CRED_ACQ pid=4632 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:42:31.167155 env[1204]: time="2025-10-29T04:42:31.167116661Z" level=info msg="RemovePodSandbox for \"88d9253440278e9e8c1a4e68f7af94c4f9992df0826ca49cf0f4efe7518bc226\"" Oct 29 04:42:31.167370 env[1204]: time="2025-10-29T04:42:31.167309575Z" level=info msg="Forcibly stopping sandbox \"88d9253440278e9e8c1a4e68f7af94c4f9992df0826ca49cf0f4efe7518bc226\"" Oct 29 04:42:31.340541 env[1204]: 2025-10-29 04:42:31.254 [WARNING][4642] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="88d9253440278e9e8c1a4e68f7af94c4f9992df0826ca49cf0f4efe7518bc226" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--jtkau.gb1.brightbox.com-k8s-coredns--668d6bf9bc--gdp2b-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"34882139-256c-45b8-b83c-22ae2a3a6d10", ResourceVersion:"1007", Generation:0, CreationTimestamp:time.Date(2025, time.October, 29, 4, 40, 34, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-jtkau.gb1.brightbox.com", ContainerID:"9028969ee66f77994fc660c40a7c4db9013f760ffa320f2f350dfe2b691cefdc", Pod:"coredns-668d6bf9bc-gdp2b", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.110.197/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali3adb2a352a9", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 29 04:42:31.340541 env[1204]: 2025-10-29 04:42:31.254 [INFO][4642] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="88d9253440278e9e8c1a4e68f7af94c4f9992df0826ca49cf0f4efe7518bc226" Oct 29 04:42:31.340541 env[1204]: 2025-10-29 04:42:31.255 [INFO][4642] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="88d9253440278e9e8c1a4e68f7af94c4f9992df0826ca49cf0f4efe7518bc226" iface="eth0" netns="" Oct 29 04:42:31.340541 env[1204]: 2025-10-29 04:42:31.255 [INFO][4642] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="88d9253440278e9e8c1a4e68f7af94c4f9992df0826ca49cf0f4efe7518bc226" Oct 29 04:42:31.340541 env[1204]: 2025-10-29 04:42:31.255 [INFO][4642] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="88d9253440278e9e8c1a4e68f7af94c4f9992df0826ca49cf0f4efe7518bc226" Oct 29 04:42:31.340541 env[1204]: 2025-10-29 04:42:31.317 [INFO][4649] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="88d9253440278e9e8c1a4e68f7af94c4f9992df0826ca49cf0f4efe7518bc226" HandleID="k8s-pod-network.88d9253440278e9e8c1a4e68f7af94c4f9992df0826ca49cf0f4efe7518bc226" Workload="srv--jtkau.gb1.brightbox.com-k8s-coredns--668d6bf9bc--gdp2b-eth0" Oct 29 04:42:31.340541 env[1204]: 2025-10-29 04:42:31.321 [INFO][4649] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 29 04:42:31.340541 env[1204]: 2025-10-29 04:42:31.321 [INFO][4649] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 29 04:42:31.340541 env[1204]: 2025-10-29 04:42:31.332 [WARNING][4649] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="88d9253440278e9e8c1a4e68f7af94c4f9992df0826ca49cf0f4efe7518bc226" HandleID="k8s-pod-network.88d9253440278e9e8c1a4e68f7af94c4f9992df0826ca49cf0f4efe7518bc226" Workload="srv--jtkau.gb1.brightbox.com-k8s-coredns--668d6bf9bc--gdp2b-eth0" Oct 29 04:42:31.340541 env[1204]: 2025-10-29 04:42:31.332 [INFO][4649] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="88d9253440278e9e8c1a4e68f7af94c4f9992df0826ca49cf0f4efe7518bc226" HandleID="k8s-pod-network.88d9253440278e9e8c1a4e68f7af94c4f9992df0826ca49cf0f4efe7518bc226" Workload="srv--jtkau.gb1.brightbox.com-k8s-coredns--668d6bf9bc--gdp2b-eth0" Oct 29 04:42:31.340541 env[1204]: 2025-10-29 04:42:31.335 [INFO][4649] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 29 04:42:31.340541 env[1204]: 2025-10-29 04:42:31.338 [INFO][4642] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="88d9253440278e9e8c1a4e68f7af94c4f9992df0826ca49cf0f4efe7518bc226" Oct 29 04:42:31.342419 env[1204]: time="2025-10-29T04:42:31.342357876Z" level=info msg="TearDown network for sandbox \"88d9253440278e9e8c1a4e68f7af94c4f9992df0826ca49cf0f4efe7518bc226\" successfully" Oct 29 04:42:31.347058 env[1204]: time="2025-10-29T04:42:31.346997781Z" level=info msg="RemovePodSandbox \"88d9253440278e9e8c1a4e68f7af94c4f9992df0826ca49cf0f4efe7518bc226\" returns successfully" Oct 29 04:42:31.349622 env[1204]: time="2025-10-29T04:42:31.349568501Z" level=info msg="StopPodSandbox for \"ad374dbade8f660d240b0bb0f068c77b921938093f528426596eab6f65d685eb\"" Oct 29 04:42:31.502284 env[1204]: 2025-10-29 04:42:31.431 [WARNING][4663] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="ad374dbade8f660d240b0bb0f068c77b921938093f528426596eab6f65d685eb" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--jtkau.gb1.brightbox.com-k8s-calico--kube--controllers--76dd6544c7--psclk-eth0", GenerateName:"calico-kube-controllers-76dd6544c7-", Namespace:"calico-system", SelfLink:"", UID:"7c4e2a15-2feb-448f-b8ed-a786076858ec", ResourceVersion:"1363", Generation:0, CreationTimestamp:time.Date(2025, time.October, 29, 4, 40, 54, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"76dd6544c7", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-jtkau.gb1.brightbox.com", ContainerID:"1ac0699e632e086e618dc86f6cc81e6697e58db0525bb6141a9eae7887a999ff", Pod:"calico-kube-controllers-76dd6544c7-psclk", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.110.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali501e1a249b6", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 29 04:42:31.502284 env[1204]: 2025-10-29 04:42:31.435 [INFO][4663] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="ad374dbade8f660d240b0bb0f068c77b921938093f528426596eab6f65d685eb" Oct 29 04:42:31.502284 env[1204]: 2025-10-29 04:42:31.436 [INFO][4663] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="ad374dbade8f660d240b0bb0f068c77b921938093f528426596eab6f65d685eb" iface="eth0" netns="" Oct 29 04:42:31.502284 env[1204]: 2025-10-29 04:42:31.436 [INFO][4663] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="ad374dbade8f660d240b0bb0f068c77b921938093f528426596eab6f65d685eb" Oct 29 04:42:31.502284 env[1204]: 2025-10-29 04:42:31.436 [INFO][4663] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="ad374dbade8f660d240b0bb0f068c77b921938093f528426596eab6f65d685eb" Oct 29 04:42:31.502284 env[1204]: 2025-10-29 04:42:31.478 [INFO][4670] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="ad374dbade8f660d240b0bb0f068c77b921938093f528426596eab6f65d685eb" HandleID="k8s-pod-network.ad374dbade8f660d240b0bb0f068c77b921938093f528426596eab6f65d685eb" Workload="srv--jtkau.gb1.brightbox.com-k8s-calico--kube--controllers--76dd6544c7--psclk-eth0" Oct 29 04:42:31.502284 env[1204]: 2025-10-29 04:42:31.478 [INFO][4670] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 29 04:42:31.502284 env[1204]: 2025-10-29 04:42:31.478 [INFO][4670] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 29 04:42:31.502284 env[1204]: 2025-10-29 04:42:31.488 [WARNING][4670] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="ad374dbade8f660d240b0bb0f068c77b921938093f528426596eab6f65d685eb" HandleID="k8s-pod-network.ad374dbade8f660d240b0bb0f068c77b921938093f528426596eab6f65d685eb" Workload="srv--jtkau.gb1.brightbox.com-k8s-calico--kube--controllers--76dd6544c7--psclk-eth0" Oct 29 04:42:31.502284 env[1204]: 2025-10-29 04:42:31.488 [INFO][4670] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="ad374dbade8f660d240b0bb0f068c77b921938093f528426596eab6f65d685eb" HandleID="k8s-pod-network.ad374dbade8f660d240b0bb0f068c77b921938093f528426596eab6f65d685eb" Workload="srv--jtkau.gb1.brightbox.com-k8s-calico--kube--controllers--76dd6544c7--psclk-eth0" Oct 29 04:42:31.502284 env[1204]: 2025-10-29 04:42:31.491 [INFO][4670] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 29 04:42:31.502284 env[1204]: 2025-10-29 04:42:31.493 [INFO][4663] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="ad374dbade8f660d240b0bb0f068c77b921938093f528426596eab6f65d685eb" Oct 29 04:42:31.503594 env[1204]: time="2025-10-29T04:42:31.502400203Z" level=info msg="TearDown network for sandbox \"ad374dbade8f660d240b0bb0f068c77b921938093f528426596eab6f65d685eb\" successfully" Oct 29 04:42:31.503594 env[1204]: time="2025-10-29T04:42:31.502530029Z" level=info msg="StopPodSandbox for \"ad374dbade8f660d240b0bb0f068c77b921938093f528426596eab6f65d685eb\" returns successfully" Oct 29 04:42:31.506646 env[1204]: time="2025-10-29T04:42:31.504738660Z" level=info msg="RemovePodSandbox for \"ad374dbade8f660d240b0bb0f068c77b921938093f528426596eab6f65d685eb\"" Oct 29 04:42:31.506646 env[1204]: time="2025-10-29T04:42:31.504823904Z" level=info msg="Forcibly stopping sandbox \"ad374dbade8f660d240b0bb0f068c77b921938093f528426596eab6f65d685eb\"" Oct 29 04:42:31.706918 env[1204]: 2025-10-29 04:42:31.618 [WARNING][4685] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="ad374dbade8f660d240b0bb0f068c77b921938093f528426596eab6f65d685eb" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--jtkau.gb1.brightbox.com-k8s-calico--kube--controllers--76dd6544c7--psclk-eth0", GenerateName:"calico-kube-controllers-76dd6544c7-", Namespace:"calico-system", SelfLink:"", UID:"7c4e2a15-2feb-448f-b8ed-a786076858ec", ResourceVersion:"1363", Generation:0, CreationTimestamp:time.Date(2025, time.October, 29, 4, 40, 54, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"76dd6544c7", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-jtkau.gb1.brightbox.com", ContainerID:"1ac0699e632e086e618dc86f6cc81e6697e58db0525bb6141a9eae7887a999ff", Pod:"calico-kube-controllers-76dd6544c7-psclk", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.110.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali501e1a249b6", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 29 04:42:31.706918 env[1204]: 2025-10-29 04:42:31.618 [INFO][4685] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="ad374dbade8f660d240b0bb0f068c77b921938093f528426596eab6f65d685eb" Oct 29 04:42:31.706918 env[1204]: 2025-10-29 04:42:31.618 [INFO][4685] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="ad374dbade8f660d240b0bb0f068c77b921938093f528426596eab6f65d685eb" iface="eth0" netns="" Oct 29 04:42:31.706918 env[1204]: 2025-10-29 04:42:31.618 [INFO][4685] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="ad374dbade8f660d240b0bb0f068c77b921938093f528426596eab6f65d685eb" Oct 29 04:42:31.706918 env[1204]: 2025-10-29 04:42:31.618 [INFO][4685] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="ad374dbade8f660d240b0bb0f068c77b921938093f528426596eab6f65d685eb" Oct 29 04:42:31.706918 env[1204]: 2025-10-29 04:42:31.671 [INFO][4695] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="ad374dbade8f660d240b0bb0f068c77b921938093f528426596eab6f65d685eb" HandleID="k8s-pod-network.ad374dbade8f660d240b0bb0f068c77b921938093f528426596eab6f65d685eb" Workload="srv--jtkau.gb1.brightbox.com-k8s-calico--kube--controllers--76dd6544c7--psclk-eth0" Oct 29 04:42:31.706918 env[1204]: 2025-10-29 04:42:31.673 [INFO][4695] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 29 04:42:31.706918 env[1204]: 2025-10-29 04:42:31.674 [INFO][4695] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 29 04:42:31.706918 env[1204]: 2025-10-29 04:42:31.693 [WARNING][4695] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="ad374dbade8f660d240b0bb0f068c77b921938093f528426596eab6f65d685eb" HandleID="k8s-pod-network.ad374dbade8f660d240b0bb0f068c77b921938093f528426596eab6f65d685eb" Workload="srv--jtkau.gb1.brightbox.com-k8s-calico--kube--controllers--76dd6544c7--psclk-eth0" Oct 29 04:42:31.706918 env[1204]: 2025-10-29 04:42:31.693 [INFO][4695] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="ad374dbade8f660d240b0bb0f068c77b921938093f528426596eab6f65d685eb" HandleID="k8s-pod-network.ad374dbade8f660d240b0bb0f068c77b921938093f528426596eab6f65d685eb" Workload="srv--jtkau.gb1.brightbox.com-k8s-calico--kube--controllers--76dd6544c7--psclk-eth0" Oct 29 04:42:31.706918 env[1204]: 2025-10-29 04:42:31.699 [INFO][4695] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 29 04:42:31.706918 env[1204]: 2025-10-29 04:42:31.702 [INFO][4685] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="ad374dbade8f660d240b0bb0f068c77b921938093f528426596eab6f65d685eb" Oct 29 04:42:31.706918 env[1204]: time="2025-10-29T04:42:31.706043633Z" level=info msg="TearDown network for sandbox \"ad374dbade8f660d240b0bb0f068c77b921938093f528426596eab6f65d685eb\" successfully" Oct 29 04:42:31.710801 env[1204]: time="2025-10-29T04:42:31.710301021Z" level=info msg="RemovePodSandbox \"ad374dbade8f660d240b0bb0f068c77b921938093f528426596eab6f65d685eb\" returns successfully" Oct 29 04:42:31.711486 env[1204]: time="2025-10-29T04:42:31.711149431Z" level=info msg="StopPodSandbox for \"3a6531b7a71ead9ba41921822995cf180b9099b3f798fb351c5a7b17032b2dc8\"" Oct 29 04:42:31.911292 env[1204]: 2025-10-29 04:42:31.777 [WARNING][4714] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="3a6531b7a71ead9ba41921822995cf180b9099b3f798fb351c5a7b17032b2dc8" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--jtkau.gb1.brightbox.com-k8s-coredns--668d6bf9bc--5zwgd-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"68d50d2a-6df7-4b3f-936e-efecabf2c6a8", ResourceVersion:"1038", Generation:0, CreationTimestamp:time.Date(2025, time.October, 29, 4, 40, 34, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-jtkau.gb1.brightbox.com", ContainerID:"109f89c8158b8299c1eca745731c95c5a244320c2617071e91e8f5dfca32d517", Pod:"coredns-668d6bf9bc-5zwgd", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.110.198/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali61f9160160c", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 29 04:42:31.911292 env[1204]: 2025-10-29 04:42:31.777 [INFO][4714] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="3a6531b7a71ead9ba41921822995cf180b9099b3f798fb351c5a7b17032b2dc8" Oct 29 04:42:31.911292 env[1204]: 2025-10-29 04:42:31.777 [INFO][4714] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="3a6531b7a71ead9ba41921822995cf180b9099b3f798fb351c5a7b17032b2dc8" iface="eth0" netns="" Oct 29 04:42:31.911292 env[1204]: 2025-10-29 04:42:31.778 [INFO][4714] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="3a6531b7a71ead9ba41921822995cf180b9099b3f798fb351c5a7b17032b2dc8" Oct 29 04:42:31.911292 env[1204]: 2025-10-29 04:42:31.778 [INFO][4714] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="3a6531b7a71ead9ba41921822995cf180b9099b3f798fb351c5a7b17032b2dc8" Oct 29 04:42:31.911292 env[1204]: 2025-10-29 04:42:31.865 [INFO][4721] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="3a6531b7a71ead9ba41921822995cf180b9099b3f798fb351c5a7b17032b2dc8" HandleID="k8s-pod-network.3a6531b7a71ead9ba41921822995cf180b9099b3f798fb351c5a7b17032b2dc8" Workload="srv--jtkau.gb1.brightbox.com-k8s-coredns--668d6bf9bc--5zwgd-eth0" Oct 29 04:42:31.911292 env[1204]: 2025-10-29 04:42:31.865 [INFO][4721] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 29 04:42:31.911292 env[1204]: 2025-10-29 04:42:31.865 [INFO][4721] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 29 04:42:31.911292 env[1204]: 2025-10-29 04:42:31.894 [WARNING][4721] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="3a6531b7a71ead9ba41921822995cf180b9099b3f798fb351c5a7b17032b2dc8" HandleID="k8s-pod-network.3a6531b7a71ead9ba41921822995cf180b9099b3f798fb351c5a7b17032b2dc8" Workload="srv--jtkau.gb1.brightbox.com-k8s-coredns--668d6bf9bc--5zwgd-eth0" Oct 29 04:42:31.911292 env[1204]: 2025-10-29 04:42:31.894 [INFO][4721] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="3a6531b7a71ead9ba41921822995cf180b9099b3f798fb351c5a7b17032b2dc8" HandleID="k8s-pod-network.3a6531b7a71ead9ba41921822995cf180b9099b3f798fb351c5a7b17032b2dc8" Workload="srv--jtkau.gb1.brightbox.com-k8s-coredns--668d6bf9bc--5zwgd-eth0" Oct 29 04:42:31.911292 env[1204]: 2025-10-29 04:42:31.903 [INFO][4721] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 29 04:42:31.911292 env[1204]: 2025-10-29 04:42:31.906 [INFO][4714] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="3a6531b7a71ead9ba41921822995cf180b9099b3f798fb351c5a7b17032b2dc8" Oct 29 04:42:31.911292 env[1204]: time="2025-10-29T04:42:31.909702053Z" level=info msg="TearDown network for sandbox \"3a6531b7a71ead9ba41921822995cf180b9099b3f798fb351c5a7b17032b2dc8\" successfully" Oct 29 04:42:31.911292 env[1204]: time="2025-10-29T04:42:31.909746639Z" level=info msg="StopPodSandbox for \"3a6531b7a71ead9ba41921822995cf180b9099b3f798fb351c5a7b17032b2dc8\" returns successfully" Oct 29 04:42:31.914167 env[1204]: time="2025-10-29T04:42:31.914125533Z" level=info msg="RemovePodSandbox for \"3a6531b7a71ead9ba41921822995cf180b9099b3f798fb351c5a7b17032b2dc8\"" Oct 29 04:42:31.914254 env[1204]: time="2025-10-29T04:42:31.914175951Z" level=info msg="Forcibly stopping sandbox \"3a6531b7a71ead9ba41921822995cf180b9099b3f798fb351c5a7b17032b2dc8\"" Oct 29 04:42:32.078976 env[1204]: 2025-10-29 04:42:31.995 [WARNING][4735] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="3a6531b7a71ead9ba41921822995cf180b9099b3f798fb351c5a7b17032b2dc8" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--jtkau.gb1.brightbox.com-k8s-coredns--668d6bf9bc--5zwgd-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"68d50d2a-6df7-4b3f-936e-efecabf2c6a8", ResourceVersion:"1038", Generation:0, CreationTimestamp:time.Date(2025, time.October, 29, 4, 40, 34, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-jtkau.gb1.brightbox.com", ContainerID:"109f89c8158b8299c1eca745731c95c5a244320c2617071e91e8f5dfca32d517", Pod:"coredns-668d6bf9bc-5zwgd", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.110.198/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali61f9160160c", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 29 04:42:32.078976 env[1204]: 2025-10-29 04:42:32.001 [INFO][4735] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="3a6531b7a71ead9ba41921822995cf180b9099b3f798fb351c5a7b17032b2dc8" Oct 29 04:42:32.078976 env[1204]: 2025-10-29 04:42:32.001 [INFO][4735] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="3a6531b7a71ead9ba41921822995cf180b9099b3f798fb351c5a7b17032b2dc8" iface="eth0" netns="" Oct 29 04:42:32.078976 env[1204]: 2025-10-29 04:42:32.001 [INFO][4735] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="3a6531b7a71ead9ba41921822995cf180b9099b3f798fb351c5a7b17032b2dc8" Oct 29 04:42:32.078976 env[1204]: 2025-10-29 04:42:32.001 [INFO][4735] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="3a6531b7a71ead9ba41921822995cf180b9099b3f798fb351c5a7b17032b2dc8" Oct 29 04:42:32.078976 env[1204]: 2025-10-29 04:42:32.064 [INFO][4742] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="3a6531b7a71ead9ba41921822995cf180b9099b3f798fb351c5a7b17032b2dc8" HandleID="k8s-pod-network.3a6531b7a71ead9ba41921822995cf180b9099b3f798fb351c5a7b17032b2dc8" Workload="srv--jtkau.gb1.brightbox.com-k8s-coredns--668d6bf9bc--5zwgd-eth0" Oct 29 04:42:32.078976 env[1204]: 2025-10-29 04:42:32.064 [INFO][4742] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 29 04:42:32.078976 env[1204]: 2025-10-29 04:42:32.064 [INFO][4742] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 29 04:42:32.078976 env[1204]: 2025-10-29 04:42:32.072 [WARNING][4742] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="3a6531b7a71ead9ba41921822995cf180b9099b3f798fb351c5a7b17032b2dc8" HandleID="k8s-pod-network.3a6531b7a71ead9ba41921822995cf180b9099b3f798fb351c5a7b17032b2dc8" Workload="srv--jtkau.gb1.brightbox.com-k8s-coredns--668d6bf9bc--5zwgd-eth0" Oct 29 04:42:32.078976 env[1204]: 2025-10-29 04:42:32.072 [INFO][4742] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="3a6531b7a71ead9ba41921822995cf180b9099b3f798fb351c5a7b17032b2dc8" HandleID="k8s-pod-network.3a6531b7a71ead9ba41921822995cf180b9099b3f798fb351c5a7b17032b2dc8" Workload="srv--jtkau.gb1.brightbox.com-k8s-coredns--668d6bf9bc--5zwgd-eth0" Oct 29 04:42:32.078976 env[1204]: 2025-10-29 04:42:32.074 [INFO][4742] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 29 04:42:32.078976 env[1204]: 2025-10-29 04:42:32.076 [INFO][4735] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="3a6531b7a71ead9ba41921822995cf180b9099b3f798fb351c5a7b17032b2dc8" Oct 29 04:42:32.080232 env[1204]: time="2025-10-29T04:42:32.079021592Z" level=info msg="TearDown network for sandbox \"3a6531b7a71ead9ba41921822995cf180b9099b3f798fb351c5a7b17032b2dc8\" successfully" Oct 29 04:42:32.082685 env[1204]: time="2025-10-29T04:42:32.082557264Z" level=info msg="RemovePodSandbox \"3a6531b7a71ead9ba41921822995cf180b9099b3f798fb351c5a7b17032b2dc8\" returns successfully" Oct 29 04:42:32.083389 env[1204]: time="2025-10-29T04:42:32.083311130Z" level=info msg="StopPodSandbox for \"7323a19d860bb5d74cbd57031ef5356f707ee0b8a4838c99c2c88581a95a96ea\"" Oct 29 04:42:32.120769 sshd[4559]: pam_unix(sshd:session): session closed for user core Oct 29 04:42:32.122000 audit[4559]: USER_END pid=4559 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:42:32.122000 audit[4559]: CRED_DISP pid=4559 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:42:32.126018 systemd[1]: sshd@16-10.230.43.230:22-147.75.109.163:57916.service: Deactivated successfully. Oct 29 04:42:32.125000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.230.43.230:22-147.75.109.163:57916 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:42:32.128159 systemd[1]: session-14.scope: Deactivated successfully. Oct 29 04:42:32.129338 systemd-logind[1188]: Session 14 logged out. Waiting for processes to exit. Oct 29 04:42:32.132539 systemd-logind[1188]: Removed session 14. Oct 29 04:42:32.260115 kubelet[1975]: E1029 04:42:32.259895 1975 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-66b476d74-xnzfh" podUID="9af229d2-d1e1-477e-9280-265e378cba4b" Oct 29 04:42:32.264149 env[1204]: 2025-10-29 04:42:32.163 [WARNING][4756] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="7323a19d860bb5d74cbd57031ef5356f707ee0b8a4838c99c2c88581a95a96ea" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--jtkau.gb1.brightbox.com-k8s-goldmane--666569f655--w7zrh-eth0", GenerateName:"goldmane-666569f655-", Namespace:"calico-system", SelfLink:"", UID:"4809fb25-1663-4bc2-b12f-599470e2bb91", ResourceVersion:"1360", Generation:0, CreationTimestamp:time.Date(2025, time.October, 29, 4, 40, 51, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"666569f655", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-jtkau.gb1.brightbox.com", ContainerID:"35ca770c06698defa49f23e6f9d66382a18c6f83d1b53e641f7e69feaf045b81", Pod:"goldmane-666569f655-w7zrh", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.110.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"calid5c4aabe7be", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 29 04:42:32.264149 env[1204]: 2025-10-29 04:42:32.164 [INFO][4756] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="7323a19d860bb5d74cbd57031ef5356f707ee0b8a4838c99c2c88581a95a96ea" Oct 29 04:42:32.264149 env[1204]: 2025-10-29 04:42:32.164 [INFO][4756] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="7323a19d860bb5d74cbd57031ef5356f707ee0b8a4838c99c2c88581a95a96ea" iface="eth0" netns="" Oct 29 04:42:32.264149 env[1204]: 2025-10-29 04:42:32.164 [INFO][4756] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="7323a19d860bb5d74cbd57031ef5356f707ee0b8a4838c99c2c88581a95a96ea" Oct 29 04:42:32.264149 env[1204]: 2025-10-29 04:42:32.164 [INFO][4756] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="7323a19d860bb5d74cbd57031ef5356f707ee0b8a4838c99c2c88581a95a96ea" Oct 29 04:42:32.264149 env[1204]: 2025-10-29 04:42:32.217 [INFO][4764] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="7323a19d860bb5d74cbd57031ef5356f707ee0b8a4838c99c2c88581a95a96ea" HandleID="k8s-pod-network.7323a19d860bb5d74cbd57031ef5356f707ee0b8a4838c99c2c88581a95a96ea" Workload="srv--jtkau.gb1.brightbox.com-k8s-goldmane--666569f655--w7zrh-eth0" Oct 29 04:42:32.264149 env[1204]: 2025-10-29 04:42:32.218 [INFO][4764] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 29 04:42:32.264149 env[1204]: 2025-10-29 04:42:32.218 [INFO][4764] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 29 04:42:32.264149 env[1204]: 2025-10-29 04:42:32.237 [WARNING][4764] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="7323a19d860bb5d74cbd57031ef5356f707ee0b8a4838c99c2c88581a95a96ea" HandleID="k8s-pod-network.7323a19d860bb5d74cbd57031ef5356f707ee0b8a4838c99c2c88581a95a96ea" Workload="srv--jtkau.gb1.brightbox.com-k8s-goldmane--666569f655--w7zrh-eth0" Oct 29 04:42:32.264149 env[1204]: 2025-10-29 04:42:32.237 [INFO][4764] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="7323a19d860bb5d74cbd57031ef5356f707ee0b8a4838c99c2c88581a95a96ea" HandleID="k8s-pod-network.7323a19d860bb5d74cbd57031ef5356f707ee0b8a4838c99c2c88581a95a96ea" Workload="srv--jtkau.gb1.brightbox.com-k8s-goldmane--666569f655--w7zrh-eth0" Oct 29 04:42:32.264149 env[1204]: 2025-10-29 04:42:32.247 [INFO][4764] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 29 04:42:32.264149 env[1204]: 2025-10-29 04:42:32.253 [INFO][4756] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="7323a19d860bb5d74cbd57031ef5356f707ee0b8a4838c99c2c88581a95a96ea" Oct 29 04:42:32.264997 env[1204]: time="2025-10-29T04:42:32.264193011Z" level=info msg="TearDown network for sandbox \"7323a19d860bb5d74cbd57031ef5356f707ee0b8a4838c99c2c88581a95a96ea\" successfully" Oct 29 04:42:32.264997 env[1204]: time="2025-10-29T04:42:32.264261633Z" level=info msg="StopPodSandbox for \"7323a19d860bb5d74cbd57031ef5356f707ee0b8a4838c99c2c88581a95a96ea\" returns successfully" Oct 29 04:42:32.269270 env[1204]: time="2025-10-29T04:42:32.269202672Z" level=info msg="RemovePodSandbox for \"7323a19d860bb5d74cbd57031ef5356f707ee0b8a4838c99c2c88581a95a96ea\"" Oct 29 04:42:32.269393 env[1204]: time="2025-10-29T04:42:32.269278800Z" level=info msg="Forcibly stopping sandbox \"7323a19d860bb5d74cbd57031ef5356f707ee0b8a4838c99c2c88581a95a96ea\"" Oct 29 04:42:32.468180 env[1204]: 2025-10-29 04:42:32.390 [WARNING][4778] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="7323a19d860bb5d74cbd57031ef5356f707ee0b8a4838c99c2c88581a95a96ea" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--jtkau.gb1.brightbox.com-k8s-goldmane--666569f655--w7zrh-eth0", GenerateName:"goldmane-666569f655-", Namespace:"calico-system", SelfLink:"", UID:"4809fb25-1663-4bc2-b12f-599470e2bb91", ResourceVersion:"1360", Generation:0, CreationTimestamp:time.Date(2025, time.October, 29, 4, 40, 51, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"666569f655", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-jtkau.gb1.brightbox.com", ContainerID:"35ca770c06698defa49f23e6f9d66382a18c6f83d1b53e641f7e69feaf045b81", Pod:"goldmane-666569f655-w7zrh", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.110.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"calid5c4aabe7be", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 29 04:42:32.468180 env[1204]: 2025-10-29 04:42:32.390 [INFO][4778] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="7323a19d860bb5d74cbd57031ef5356f707ee0b8a4838c99c2c88581a95a96ea" Oct 29 04:42:32.468180 env[1204]: 2025-10-29 04:42:32.390 [INFO][4778] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="7323a19d860bb5d74cbd57031ef5356f707ee0b8a4838c99c2c88581a95a96ea" iface="eth0" netns="" Oct 29 04:42:32.468180 env[1204]: 2025-10-29 04:42:32.390 [INFO][4778] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="7323a19d860bb5d74cbd57031ef5356f707ee0b8a4838c99c2c88581a95a96ea" Oct 29 04:42:32.468180 env[1204]: 2025-10-29 04:42:32.390 [INFO][4778] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="7323a19d860bb5d74cbd57031ef5356f707ee0b8a4838c99c2c88581a95a96ea" Oct 29 04:42:32.468180 env[1204]: 2025-10-29 04:42:32.447 [INFO][4785] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="7323a19d860bb5d74cbd57031ef5356f707ee0b8a4838c99c2c88581a95a96ea" HandleID="k8s-pod-network.7323a19d860bb5d74cbd57031ef5356f707ee0b8a4838c99c2c88581a95a96ea" Workload="srv--jtkau.gb1.brightbox.com-k8s-goldmane--666569f655--w7zrh-eth0" Oct 29 04:42:32.468180 env[1204]: 2025-10-29 04:42:32.447 [INFO][4785] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 29 04:42:32.468180 env[1204]: 2025-10-29 04:42:32.447 [INFO][4785] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 29 04:42:32.468180 env[1204]: 2025-10-29 04:42:32.458 [WARNING][4785] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="7323a19d860bb5d74cbd57031ef5356f707ee0b8a4838c99c2c88581a95a96ea" HandleID="k8s-pod-network.7323a19d860bb5d74cbd57031ef5356f707ee0b8a4838c99c2c88581a95a96ea" Workload="srv--jtkau.gb1.brightbox.com-k8s-goldmane--666569f655--w7zrh-eth0" Oct 29 04:42:32.468180 env[1204]: 2025-10-29 04:42:32.458 [INFO][4785] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="7323a19d860bb5d74cbd57031ef5356f707ee0b8a4838c99c2c88581a95a96ea" HandleID="k8s-pod-network.7323a19d860bb5d74cbd57031ef5356f707ee0b8a4838c99c2c88581a95a96ea" Workload="srv--jtkau.gb1.brightbox.com-k8s-goldmane--666569f655--w7zrh-eth0" Oct 29 04:42:32.468180 env[1204]: 2025-10-29 04:42:32.461 [INFO][4785] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 29 04:42:32.468180 env[1204]: 2025-10-29 04:42:32.465 [INFO][4778] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="7323a19d860bb5d74cbd57031ef5356f707ee0b8a4838c99c2c88581a95a96ea" Oct 29 04:42:32.470420 env[1204]: time="2025-10-29T04:42:32.469486344Z" level=info msg="TearDown network for sandbox \"7323a19d860bb5d74cbd57031ef5356f707ee0b8a4838c99c2c88581a95a96ea\" successfully" Oct 29 04:42:32.476764 env[1204]: time="2025-10-29T04:42:32.476716327Z" level=info msg="RemovePodSandbox \"7323a19d860bb5d74cbd57031ef5356f707ee0b8a4838c99c2c88581a95a96ea\" returns successfully" Oct 29 04:42:32.478267 env[1204]: time="2025-10-29T04:42:32.478214391Z" level=info msg="StopPodSandbox for \"e60a5ca3dace57260718564cf1200a77eea8f638b71cc553b50495e72983c2f5\"" Oct 29 04:42:32.622262 env[1204]: 2025-10-29 04:42:32.539 [WARNING][4800] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="e60a5ca3dace57260718564cf1200a77eea8f638b71cc553b50495e72983c2f5" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--jtkau.gb1.brightbox.com-k8s-calico--apiserver--66b476d74--9x56r-eth0", GenerateName:"calico-apiserver-66b476d74-", Namespace:"calico-apiserver", SelfLink:"", UID:"c55cf193-f032-43fb-94cc-3208d0f6de96", ResourceVersion:"1377", Generation:0, CreationTimestamp:time.Date(2025, time.October, 29, 4, 40, 47, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"66b476d74", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-jtkau.gb1.brightbox.com", ContainerID:"b8cd6978b6ee5329ba8e7a89368b6cd441c54f939e4983db227c3da372f768a7", Pod:"calico-apiserver-66b476d74-9x56r", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.110.200/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali34bee461f0e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 29 04:42:32.622262 env[1204]: 2025-10-29 04:42:32.540 [INFO][4800] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="e60a5ca3dace57260718564cf1200a77eea8f638b71cc553b50495e72983c2f5" Oct 29 04:42:32.622262 env[1204]: 2025-10-29 04:42:32.540 [INFO][4800] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="e60a5ca3dace57260718564cf1200a77eea8f638b71cc553b50495e72983c2f5" iface="eth0" netns="" Oct 29 04:42:32.622262 env[1204]: 2025-10-29 04:42:32.540 [INFO][4800] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="e60a5ca3dace57260718564cf1200a77eea8f638b71cc553b50495e72983c2f5" Oct 29 04:42:32.622262 env[1204]: 2025-10-29 04:42:32.540 [INFO][4800] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e60a5ca3dace57260718564cf1200a77eea8f638b71cc553b50495e72983c2f5" Oct 29 04:42:32.622262 env[1204]: 2025-10-29 04:42:32.583 [INFO][4807] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="e60a5ca3dace57260718564cf1200a77eea8f638b71cc553b50495e72983c2f5" HandleID="k8s-pod-network.e60a5ca3dace57260718564cf1200a77eea8f638b71cc553b50495e72983c2f5" Workload="srv--jtkau.gb1.brightbox.com-k8s-calico--apiserver--66b476d74--9x56r-eth0" Oct 29 04:42:32.622262 env[1204]: 2025-10-29 04:42:32.583 [INFO][4807] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 29 04:42:32.622262 env[1204]: 2025-10-29 04:42:32.583 [INFO][4807] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 29 04:42:32.622262 env[1204]: 2025-10-29 04:42:32.608 [WARNING][4807] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="e60a5ca3dace57260718564cf1200a77eea8f638b71cc553b50495e72983c2f5" HandleID="k8s-pod-network.e60a5ca3dace57260718564cf1200a77eea8f638b71cc553b50495e72983c2f5" Workload="srv--jtkau.gb1.brightbox.com-k8s-calico--apiserver--66b476d74--9x56r-eth0" Oct 29 04:42:32.622262 env[1204]: 2025-10-29 04:42:32.609 [INFO][4807] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="e60a5ca3dace57260718564cf1200a77eea8f638b71cc553b50495e72983c2f5" HandleID="k8s-pod-network.e60a5ca3dace57260718564cf1200a77eea8f638b71cc553b50495e72983c2f5" Workload="srv--jtkau.gb1.brightbox.com-k8s-calico--apiserver--66b476d74--9x56r-eth0" Oct 29 04:42:32.622262 env[1204]: 2025-10-29 04:42:32.615 [INFO][4807] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 29 04:42:32.622262 env[1204]: 2025-10-29 04:42:32.617 [INFO][4800] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="e60a5ca3dace57260718564cf1200a77eea8f638b71cc553b50495e72983c2f5" Oct 29 04:42:32.622262 env[1204]: time="2025-10-29T04:42:32.620038579Z" level=info msg="TearDown network for sandbox \"e60a5ca3dace57260718564cf1200a77eea8f638b71cc553b50495e72983c2f5\" successfully" Oct 29 04:42:32.622262 env[1204]: time="2025-10-29T04:42:32.620132267Z" level=info msg="StopPodSandbox for \"e60a5ca3dace57260718564cf1200a77eea8f638b71cc553b50495e72983c2f5\" returns successfully" Oct 29 04:42:32.623712 env[1204]: time="2025-10-29T04:42:32.623589831Z" level=info msg="RemovePodSandbox for \"e60a5ca3dace57260718564cf1200a77eea8f638b71cc553b50495e72983c2f5\"" Oct 29 04:42:32.623983 env[1204]: time="2025-10-29T04:42:32.623919824Z" level=info msg="Forcibly stopping sandbox \"e60a5ca3dace57260718564cf1200a77eea8f638b71cc553b50495e72983c2f5\"" Oct 29 04:42:32.759172 env[1204]: 2025-10-29 04:42:32.684 [WARNING][4821] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="e60a5ca3dace57260718564cf1200a77eea8f638b71cc553b50495e72983c2f5" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"srv--jtkau.gb1.brightbox.com-k8s-calico--apiserver--66b476d74--9x56r-eth0", GenerateName:"calico-apiserver-66b476d74-", Namespace:"calico-apiserver", SelfLink:"", UID:"c55cf193-f032-43fb-94cc-3208d0f6de96", ResourceVersion:"1377", Generation:0, CreationTimestamp:time.Date(2025, time.October, 29, 4, 40, 47, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"66b476d74", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"srv-jtkau.gb1.brightbox.com", ContainerID:"b8cd6978b6ee5329ba8e7a89368b6cd441c54f939e4983db227c3da372f768a7", Pod:"calico-apiserver-66b476d74-9x56r", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.110.200/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali34bee461f0e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} Oct 29 04:42:32.759172 env[1204]: 2025-10-29 04:42:32.685 [INFO][4821] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="e60a5ca3dace57260718564cf1200a77eea8f638b71cc553b50495e72983c2f5" Oct 29 04:42:32.759172 env[1204]: 2025-10-29 04:42:32.685 [INFO][4821] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="e60a5ca3dace57260718564cf1200a77eea8f638b71cc553b50495e72983c2f5" iface="eth0" netns="" Oct 29 04:42:32.759172 env[1204]: 2025-10-29 04:42:32.685 [INFO][4821] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="e60a5ca3dace57260718564cf1200a77eea8f638b71cc553b50495e72983c2f5" Oct 29 04:42:32.759172 env[1204]: 2025-10-29 04:42:32.685 [INFO][4821] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e60a5ca3dace57260718564cf1200a77eea8f638b71cc553b50495e72983c2f5" Oct 29 04:42:32.759172 env[1204]: 2025-10-29 04:42:32.725 [INFO][4828] ipam/ipam_plugin.go 436: Releasing address using handleID ContainerID="e60a5ca3dace57260718564cf1200a77eea8f638b71cc553b50495e72983c2f5" HandleID="k8s-pod-network.e60a5ca3dace57260718564cf1200a77eea8f638b71cc553b50495e72983c2f5" Workload="srv--jtkau.gb1.brightbox.com-k8s-calico--apiserver--66b476d74--9x56r-eth0" Oct 29 04:42:32.759172 env[1204]: 2025-10-29 04:42:32.726 [INFO][4828] ipam/ipam_plugin.go 377: About to acquire host-wide IPAM lock. Oct 29 04:42:32.759172 env[1204]: 2025-10-29 04:42:32.726 [INFO][4828] ipam/ipam_plugin.go 392: Acquired host-wide IPAM lock. Oct 29 04:42:32.759172 env[1204]: 2025-10-29 04:42:32.748 [WARNING][4828] ipam/ipam_plugin.go 453: Asked to release address but it doesn't exist. Ignoring ContainerID="e60a5ca3dace57260718564cf1200a77eea8f638b71cc553b50495e72983c2f5" HandleID="k8s-pod-network.e60a5ca3dace57260718564cf1200a77eea8f638b71cc553b50495e72983c2f5" Workload="srv--jtkau.gb1.brightbox.com-k8s-calico--apiserver--66b476d74--9x56r-eth0" Oct 29 04:42:32.759172 env[1204]: 2025-10-29 04:42:32.748 [INFO][4828] ipam/ipam_plugin.go 464: Releasing address using workloadID ContainerID="e60a5ca3dace57260718564cf1200a77eea8f638b71cc553b50495e72983c2f5" HandleID="k8s-pod-network.e60a5ca3dace57260718564cf1200a77eea8f638b71cc553b50495e72983c2f5" Workload="srv--jtkau.gb1.brightbox.com-k8s-calico--apiserver--66b476d74--9x56r-eth0" Oct 29 04:42:32.759172 env[1204]: 2025-10-29 04:42:32.754 [INFO][4828] ipam/ipam_plugin.go 398: Released host-wide IPAM lock. Oct 29 04:42:32.759172 env[1204]: 2025-10-29 04:42:32.756 [INFO][4821] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="e60a5ca3dace57260718564cf1200a77eea8f638b71cc553b50495e72983c2f5" Oct 29 04:42:32.760572 env[1204]: time="2025-10-29T04:42:32.760507768Z" level=info msg="TearDown network for sandbox \"e60a5ca3dace57260718564cf1200a77eea8f638b71cc553b50495e72983c2f5\" successfully" Oct 29 04:42:32.766282 env[1204]: time="2025-10-29T04:42:32.766224058Z" level=info msg="RemovePodSandbox \"e60a5ca3dace57260718564cf1200a77eea8f638b71cc553b50495e72983c2f5\" returns successfully" Oct 29 04:42:37.275973 systemd[1]: Started sshd@17-10.230.43.230:22-147.75.109.163:52206.service. Oct 29 04:42:37.278223 kernel: kauditd_printk_skb: 13 callbacks suppressed Oct 29 04:42:37.278434 kernel: audit: type=1130 audit(1761712957.274:1426): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.230.43.230:22-147.75.109.163:52206 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:42:37.274000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.230.43.230:22-147.75.109.163:52206 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:42:38.188000 audit[4837]: USER_ACCT pid=4837 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:42:38.192278 sshd[4837]: Accepted publickey for core from 147.75.109.163 port 52206 ssh2: RSA SHA256:ZzxZ37pC6YJySS9q7Vi2CaqOM6Jn/4IZMTu+T8q4mXw Oct 29 04:42:38.196629 kernel: audit: type=1101 audit(1761712958.188:1427): pid=4837 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:42:38.197679 sshd[4837]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 29 04:42:38.195000 audit[4837]: CRED_ACQ pid=4837 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:42:38.210733 kernel: audit: type=1103 audit(1761712958.195:1428): pid=4837 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:42:38.210884 kernel: audit: type=1006 audit(1761712958.195:1429): pid=4837 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 Oct 29 04:42:38.195000 audit[4837]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffea9c61770 a2=3 a3=0 items=0 ppid=1 pid=4837 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:38.233476 kernel: audit: type=1300 audit(1761712958.195:1429): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffea9c61770 a2=3 a3=0 items=0 ppid=1 pid=4837 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:38.233678 kernel: audit: type=1327 audit(1761712958.195:1429): proctitle=737368643A20636F7265205B707269765D Oct 29 04:42:38.195000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 29 04:42:38.241728 systemd-logind[1188]: New session 15 of user core. Oct 29 04:42:38.242829 systemd[1]: Started session-15.scope. Oct 29 04:42:38.258000 audit[4837]: USER_START pid=4837 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:42:38.268437 kubelet[1975]: E1029 04:42:38.260741 1975 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found\"]" pod="calico-system/whisker-7fbcdbccd-mghcv" podUID="f101f74a-91c5-460d-8026-7c7655b6a631" Oct 29 04:42:38.268437 kubelet[1975]: E1029 04:42:38.262048 1975 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-d8hbp" podUID="78135185-6b36-431d-89d1-d452e0f3a516" Oct 29 04:42:38.269712 kernel: audit: type=1105 audit(1761712958.258:1430): pid=4837 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:42:38.268000 audit[4839]: CRED_ACQ pid=4839 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:42:38.280675 kernel: audit: type=1103 audit(1761712958.268:1431): pid=4839 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:42:39.003970 sshd[4837]: pam_unix(sshd:session): session closed for user core Oct 29 04:42:39.005000 audit[4837]: USER_END pid=4837 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:42:39.009268 systemd[1]: sshd@17-10.230.43.230:22-147.75.109.163:52206.service: Deactivated successfully. Oct 29 04:42:39.011040 systemd[1]: session-15.scope: Deactivated successfully. Oct 29 04:42:39.014800 kernel: audit: type=1106 audit(1761712959.005:1432): pid=4837 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:42:39.014036 systemd-logind[1188]: Session 15 logged out. Waiting for processes to exit. Oct 29 04:42:39.005000 audit[4837]: CRED_DISP pid=4837 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:42:39.016041 systemd-logind[1188]: Removed session 15. Oct 29 04:42:39.021642 kernel: audit: type=1104 audit(1761712959.005:1433): pid=4837 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:42:39.005000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.230.43.230:22-147.75.109.163:52206 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:42:39.157177 systemd[1]: Started sshd@18-10.230.43.230:22-147.75.109.163:52214.service. Oct 29 04:42:39.156000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.230.43.230:22-147.75.109.163:52214 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:42:39.247250 kubelet[1975]: E1029 04:42:39.247140 1975 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-kube-controllers\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found\"" pod="calico-system/calico-kube-controllers-76dd6544c7-psclk" podUID="7c4e2a15-2feb-448f-b8ed-a786076858ec" Oct 29 04:42:40.078491 sshd[4848]: Accepted publickey for core from 147.75.109.163 port 52214 ssh2: RSA SHA256:ZzxZ37pC6YJySS9q7Vi2CaqOM6Jn/4IZMTu+T8q4mXw Oct 29 04:42:40.076000 audit[4848]: USER_ACCT pid=4848 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:42:40.079000 audit[4848]: CRED_ACQ pid=4848 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:42:40.079000 audit[4848]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcc814fa80 a2=3 a3=0 items=0 ppid=1 pid=4848 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:40.079000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 29 04:42:40.081764 sshd[4848]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 29 04:42:40.093008 systemd-logind[1188]: New session 16 of user core. Oct 29 04:42:40.094135 systemd[1]: Started session-16.scope. Oct 29 04:42:40.103000 audit[4848]: USER_START pid=4848 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:42:40.106000 audit[4850]: CRED_ACQ pid=4850 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:42:40.247325 kubelet[1975]: E1029 04:42:40.246556 1975 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found\"" pod="calico-system/goldmane-666569f655-w7zrh" podUID="4809fb25-1663-4bc2-b12f-599470e2bb91" Oct 29 04:42:41.258729 kubelet[1975]: E1029 04:42:41.258653 1975 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-66b476d74-9x56r" podUID="c55cf193-f032-43fb-94cc-3208d0f6de96" Oct 29 04:42:41.279135 sshd[4848]: pam_unix(sshd:session): session closed for user core Oct 29 04:42:41.281000 audit[4848]: USER_END pid=4848 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:42:41.281000 audit[4848]: CRED_DISP pid=4848 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:42:41.284000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.230.43.230:22-147.75.109.163:52214 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:42:41.285315 systemd[1]: sshd@18-10.230.43.230:22-147.75.109.163:52214.service: Deactivated successfully. Oct 29 04:42:41.287896 systemd[1]: session-16.scope: Deactivated successfully. Oct 29 04:42:41.290676 systemd-logind[1188]: Session 16 logged out. Waiting for processes to exit. Oct 29 04:42:41.292426 systemd-logind[1188]: Removed session 16. Oct 29 04:42:41.428988 systemd[1]: Started sshd@19-10.230.43.230:22-147.75.109.163:49276.service. Oct 29 04:42:41.428000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.230.43.230:22-147.75.109.163:49276 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:42:42.351000 audit[4858]: USER_ACCT pid=4858 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:42:42.355329 kernel: kauditd_printk_skb: 13 callbacks suppressed Oct 29 04:42:42.355452 kernel: audit: type=1101 audit(1761712962.351:1445): pid=4858 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:42:42.355530 sshd[4858]: Accepted publickey for core from 147.75.109.163 port 49276 ssh2: RSA SHA256:ZzxZ37pC6YJySS9q7Vi2CaqOM6Jn/4IZMTu+T8q4mXw Oct 29 04:42:42.363310 sshd[4858]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 29 04:42:42.361000 audit[4858]: CRED_ACQ pid=4858 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:42:42.370630 kernel: audit: type=1103 audit(1761712962.361:1446): pid=4858 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:42:42.361000 audit[4858]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffe0da5510 a2=3 a3=0 items=0 ppid=1 pid=4858 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:42.382942 kernel: audit: type=1006 audit(1761712962.361:1447): pid=4858 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 Oct 29 04:42:42.383046 kernel: audit: type=1300 audit(1761712962.361:1447): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffe0da5510 a2=3 a3=0 items=0 ppid=1 pid=4858 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:42.383116 kernel: audit: type=1327 audit(1761712962.361:1447): proctitle=737368643A20636F7265205B707269765D Oct 29 04:42:42.361000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 29 04:42:42.382342 systemd-logind[1188]: New session 17 of user core. Oct 29 04:42:42.385394 systemd[1]: Started session-17.scope. Oct 29 04:42:42.395000 audit[4858]: USER_START pid=4858 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:42:42.397000 audit[4860]: CRED_ACQ pid=4860 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:42:42.410567 kernel: audit: type=1105 audit(1761712962.395:1448): pid=4858 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:42:42.410736 kernel: audit: type=1103 audit(1761712962.397:1449): pid=4860 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:42:44.098000 audit[4873]: NETFILTER_CFG table=filter:126 family=2 entries=26 op=nft_register_rule pid=4873 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 29 04:42:44.098000 audit[4873]: SYSCALL arch=c000003e syscall=46 success=yes exit=14176 a0=3 a1=7ffede9cea70 a2=0 a3=7ffede9cea5c items=0 ppid=2117 pid=4873 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:44.110720 kernel: audit: type=1325 audit(1761712964.098:1450): table=filter:126 family=2 entries=26 op=nft_register_rule pid=4873 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 29 04:42:44.111149 kernel: audit: type=1300 audit(1761712964.098:1450): arch=c000003e syscall=46 success=yes exit=14176 a0=3 a1=7ffede9cea70 a2=0 a3=7ffede9cea5c items=0 ppid=2117 pid=4873 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:44.098000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 29 04:42:44.118153 kernel: audit: type=1327 audit(1761712964.098:1450): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 29 04:42:44.120000 audit[4873]: NETFILTER_CFG table=nat:127 family=2 entries=20 op=nft_register_rule pid=4873 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 29 04:42:44.120000 audit[4873]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffede9cea70 a2=0 a3=0 items=0 ppid=2117 pid=4873 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:44.120000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 29 04:42:44.157000 audit[4875]: NETFILTER_CFG table=filter:128 family=2 entries=38 op=nft_register_rule pid=4875 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 29 04:42:44.157000 audit[4875]: SYSCALL arch=c000003e syscall=46 success=yes exit=14176 a0=3 a1=7ffda06e70b0 a2=0 a3=7ffda06e709c items=0 ppid=2117 pid=4875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:44.157000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 29 04:42:44.163000 audit[4875]: NETFILTER_CFG table=nat:129 family=2 entries=20 op=nft_register_rule pid=4875 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 29 04:42:44.163000 audit[4875]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffda06e70b0 a2=0 a3=0 items=0 ppid=2117 pid=4875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:44.163000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 29 04:42:44.173620 sshd[4858]: pam_unix(sshd:session): session closed for user core Oct 29 04:42:44.177000 audit[4858]: USER_END pid=4858 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:42:44.177000 audit[4858]: CRED_DISP pid=4858 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:42:44.180000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.230.43.230:22-147.75.109.163:49276 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:42:44.180897 systemd[1]: sshd@19-10.230.43.230:22-147.75.109.163:49276.service: Deactivated successfully. Oct 29 04:42:44.183765 systemd[1]: session-17.scope: Deactivated successfully. Oct 29 04:42:44.185541 systemd-logind[1188]: Session 17 logged out. Waiting for processes to exit. Oct 29 04:42:44.188957 systemd-logind[1188]: Removed session 17. Oct 29 04:42:44.325531 systemd[1]: Started sshd@20-10.230.43.230:22-147.75.109.163:49278.service. Oct 29 04:42:44.325000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.230.43.230:22-147.75.109.163:49278 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:42:45.251000 audit[4878]: USER_ACCT pid=4878 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:42:45.253267 sshd[4878]: Accepted publickey for core from 147.75.109.163 port 49278 ssh2: RSA SHA256:ZzxZ37pC6YJySS9q7Vi2CaqOM6Jn/4IZMTu+T8q4mXw Oct 29 04:42:45.252000 audit[4878]: CRED_ACQ pid=4878 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:42:45.253000 audit[4878]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcbc4f1a40 a2=3 a3=0 items=0 ppid=1 pid=4878 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:45.253000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 29 04:42:45.254202 sshd[4878]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 29 04:42:45.272779 systemd[1]: Started session-18.scope. Oct 29 04:42:45.273431 systemd-logind[1188]: New session 18 of user core. Oct 29 04:42:45.285000 audit[4878]: USER_START pid=4878 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:42:45.288000 audit[4880]: CRED_ACQ pid=4880 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:42:46.518122 sshd[4878]: pam_unix(sshd:session): session closed for user core Oct 29 04:42:46.521000 audit[4878]: USER_END pid=4878 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:42:46.521000 audit[4878]: CRED_DISP pid=4878 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:42:46.524718 systemd[1]: sshd@20-10.230.43.230:22-147.75.109.163:49278.service: Deactivated successfully. Oct 29 04:42:46.524000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.230.43.230:22-147.75.109.163:49278 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:42:46.526541 systemd[1]: session-18.scope: Deactivated successfully. Oct 29 04:42:46.527483 systemd-logind[1188]: Session 18 logged out. Waiting for processes to exit. Oct 29 04:42:46.529341 systemd-logind[1188]: Removed session 18. Oct 29 04:42:46.673546 systemd[1]: Started sshd@21-10.230.43.230:22-147.75.109.163:49288.service. Oct 29 04:42:46.673000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.230.43.230:22-147.75.109.163:49288 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:42:47.315305 kubelet[1975]: E1029 04:42:47.315193 1975 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-66b476d74-xnzfh" podUID="9af229d2-d1e1-477e-9280-265e378cba4b" Oct 29 04:42:47.601654 sshd[4888]: Accepted publickey for core from 147.75.109.163 port 49288 ssh2: RSA SHA256:ZzxZ37pC6YJySS9q7Vi2CaqOM6Jn/4IZMTu+T8q4mXw Oct 29 04:42:47.600000 audit[4888]: USER_ACCT pid=4888 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:42:47.603986 kernel: kauditd_printk_skb: 24 callbacks suppressed Oct 29 04:42:47.604142 kernel: audit: type=1101 audit(1761712967.600:1467): pid=4888 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:42:47.605801 sshd[4888]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 29 04:42:47.603000 audit[4888]: CRED_ACQ pid=4888 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:42:47.622885 kernel: audit: type=1103 audit(1761712967.603:1468): pid=4888 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:42:47.623048 kernel: audit: type=1006 audit(1761712967.603:1469): pid=4888 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=19 res=1 Oct 29 04:42:47.623538 kernel: audit: type=1300 audit(1761712967.603:1469): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe82441aa0 a2=3 a3=0 items=0 ppid=1 pid=4888 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:47.603000 audit[4888]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe82441aa0 a2=3 a3=0 items=0 ppid=1 pid=4888 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:47.629953 kernel: audit: type=1327 audit(1761712967.603:1469): proctitle=737368643A20636F7265205B707269765D Oct 29 04:42:47.603000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 29 04:42:47.635834 systemd-logind[1188]: New session 19 of user core. Oct 29 04:42:47.638242 systemd[1]: Started session-19.scope. Oct 29 04:42:47.646000 audit[4888]: USER_START pid=4888 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:42:47.654650 kernel: audit: type=1105 audit(1761712967.646:1470): pid=4888 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:42:47.656000 audit[4890]: CRED_ACQ pid=4890 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:42:47.663637 kernel: audit: type=1103 audit(1761712967.656:1471): pid=4890 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:42:48.413173 sshd[4888]: pam_unix(sshd:session): session closed for user core Oct 29 04:42:48.414000 audit[4888]: USER_END pid=4888 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:42:48.416921 systemd[1]: sshd@21-10.230.43.230:22-147.75.109.163:49288.service: Deactivated successfully. Oct 29 04:42:48.419107 systemd[1]: session-19.scope: Deactivated successfully. Oct 29 04:42:48.422873 kernel: audit: type=1106 audit(1761712968.414:1472): pid=4888 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:42:48.423442 systemd-logind[1188]: Session 19 logged out. Waiting for processes to exit. Oct 29 04:42:48.414000 audit[4888]: CRED_DISP pid=4888 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:42:48.430210 systemd-logind[1188]: Removed session 19. Oct 29 04:42:48.430620 kernel: audit: type=1104 audit(1761712968.414:1473): pid=4888 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:42:48.416000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.230.43.230:22-147.75.109.163:49288 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:42:48.439633 kernel: audit: type=1131 audit(1761712968.416:1474): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.230.43.230:22-147.75.109.163:49288 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:42:49.251906 kubelet[1975]: E1029 04:42:49.251793 1975 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found\"]" pod="calico-system/whisker-7fbcdbccd-mghcv" podUID="f101f74a-91c5-460d-8026-7c7655b6a631" Oct 29 04:42:50.305808 systemd[1]: Started sshd@22-10.230.43.230:22-80.94.95.115:31570.service. Oct 29 04:42:50.306000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.230.43.230:22-80.94.95.115:31570 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:42:52.250650 env[1204]: time="2025-10-29T04:42:52.249574052Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.4\"" Oct 29 04:42:52.252092 kubelet[1975]: E1029 04:42:52.251935 1975 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-kube-controllers\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found\"" pod="calico-system/calico-kube-controllers-76dd6544c7-psclk" podUID="7c4e2a15-2feb-448f-b8ed-a786076858ec" Oct 29 04:42:52.593299 env[1204]: time="2025-10-29T04:42:52.593053030Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 29 04:42:52.595244 env[1204]: time="2025-10-29T04:42:52.595149730Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" Oct 29 04:42:52.597946 kubelet[1975]: E1029 04:42:52.597837 1975 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" image="ghcr.io/flatcar/calico/csi:v3.30.4" Oct 29 04:42:52.605402 kubelet[1975]: E1029 04:42:52.605254 1975 kuberuntime_image.go:55] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" image="ghcr.io/flatcar/calico/csi:v3.30.4" Oct 29 04:42:52.607303 kubelet[1975]: E1029 04:42:52.607218 1975 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:calico-csi,Image:ghcr.io/flatcar/calico/csi:v3.30.4,Command:[],Args:[--nodeid=$(KUBE_NODE_NAME) --loglevel=$(LOG_LEVEL)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:warn,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kubelet-dir,ReadOnly:false,MountPath:/var/lib/kubelet,SubPath:,MountPropagation:*Bidirectional,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:varrun,ReadOnly:false,MountPath:/var/run,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-h67bl,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*true,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:*false,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*true,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-d8hbp_calico-system(78135185-6b36-431d-89d1-d452e0f3a516): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/csi:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/csi:v3.30.4\": ghcr.io/flatcar/calico/csi:v3.30.4: not found" logger="UnhandledError" Oct 29 04:42:52.610306 env[1204]: time="2025-10-29T04:42:52.610254311Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\"" Oct 29 04:42:52.925442 env[1204]: time="2025-10-29T04:42:52.925357352Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 29 04:42:52.927082 env[1204]: time="2025-10-29T04:42:52.927008934Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" Oct 29 04:42:52.927666 kubelet[1975]: E1029 04:42:52.927583 1975 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4" Oct 29 04:42:52.927916 kubelet[1975]: E1029 04:42:52.927865 1975 kuberuntime_image.go:55] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" image="ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4" Oct 29 04:42:52.928845 kubelet[1975]: E1029 04:42:52.928748 1975 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:csi-node-driver-registrar,Image:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4,Command:[],Args:[--v=5 --csi-address=$(ADDRESS) --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH)],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:ADDRESS,Value:/csi/csi.sock,ValueFrom:nil,},EnvVar{Name:DRIVER_REG_SOCK_PATH,Value:/var/lib/kubelet/plugins/csi.tigera.io/csi.sock,ValueFrom:nil,},EnvVar{Name:KUBE_NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:registration-dir,ReadOnly:false,MountPath:/registration,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:socket-dir,ReadOnly:false,MountPath:/csi,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-h67bl,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*true,SELinuxOptions:nil,RunAsUser:*0,RunAsNonRoot:*false,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*true,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod csi-node-driver-d8hbp_calico-system(78135185-6b36-431d-89d1-d452e0f3a516): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found" logger="UnhandledError" Oct 29 04:42:52.930580 kubelet[1975]: E1029 04:42:52.930355 1975 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-d8hbp" podUID="78135185-6b36-431d-89d1-d452e0f3a516" Oct 29 04:42:53.393631 sshd[4900]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.94.95.115 user=root Oct 29 04:42:53.393000 audit[4900]: USER_AUTH pid=4900 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=80.94.95.115 addr=80.94.95.115 terminal=ssh res=failed' Oct 29 04:42:53.395596 kernel: kauditd_printk_skb: 1 callbacks suppressed Oct 29 04:42:53.395755 kernel: audit: type=1100 audit(1761712973.393:1476): pid=4900 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=80.94.95.115 addr=80.94.95.115 terminal=ssh res=failed' Oct 29 04:42:53.584000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.230.43.230:22-147.75.109.163:37016 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:42:53.584805 systemd[1]: Started sshd@23-10.230.43.230:22-147.75.109.163:37016.service. Oct 29 04:42:53.591640 kernel: audit: type=1130 audit(1761712973.584:1477): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.230.43.230:22-147.75.109.163:37016 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:42:54.247282 kubelet[1975]: E1029 04:42:54.246546 1975 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-66b476d74-9x56r" podUID="c55cf193-f032-43fb-94cc-3208d0f6de96" Oct 29 04:42:54.248854 env[1204]: time="2025-10-29T04:42:54.248412872Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.4\"" Oct 29 04:42:54.485000 audit[4909]: USER_ACCT pid=4909 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:42:54.486240 sshd[4909]: Accepted publickey for core from 147.75.109.163 port 37016 ssh2: RSA SHA256:ZzxZ37pC6YJySS9q7Vi2CaqOM6Jn/4IZMTu+T8q4mXw Oct 29 04:42:54.492632 kernel: audit: type=1101 audit(1761712974.485:1478): pid=4909 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:42:54.493000 audit[4909]: CRED_ACQ pid=4909 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:42:54.495481 sshd[4909]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 29 04:42:54.501860 kernel: audit: type=1103 audit(1761712974.493:1479): pid=4909 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:42:54.501959 kernel: audit: type=1006 audit(1761712974.493:1480): pid=4909 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=20 res=1 Oct 29 04:42:54.506048 kernel: audit: type=1300 audit(1761712974.493:1480): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe242eb510 a2=3 a3=0 items=0 ppid=1 pid=4909 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:54.493000 audit[4909]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe242eb510 a2=3 a3=0 items=0 ppid=1 pid=4909 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:54.493000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 29 04:42:54.517644 kernel: audit: type=1327 audit(1761712974.493:1480): proctitle=737368643A20636F7265205B707269765D Oct 29 04:42:54.522621 systemd-logind[1188]: New session 20 of user core. Oct 29 04:42:54.524542 systemd[1]: Started session-20.scope. Oct 29 04:42:54.535000 audit[4909]: USER_START pid=4909 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:42:54.543672 kernel: audit: type=1105 audit(1761712974.535:1481): pid=4909 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:42:54.538000 audit[4911]: CRED_ACQ pid=4911 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:42:54.552884 kernel: audit: type=1103 audit(1761712974.538:1482): pid=4911 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:42:54.566255 env[1204]: time="2025-10-29T04:42:54.565918502Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 29 04:42:54.568080 env[1204]: time="2025-10-29T04:42:54.567925138Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found" Oct 29 04:42:54.568425 kubelet[1975]: E1029 04:42:54.568336 1975 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found" image="ghcr.io/flatcar/calico/goldmane:v3.30.4" Oct 29 04:42:54.568525 kubelet[1975]: E1029 04:42:54.568445 1975 kuberuntime_image.go:55] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found" image="ghcr.io/flatcar/calico/goldmane:v3.30.4" Oct 29 04:42:54.569921 kubelet[1975]: E1029 04:42:54.569565 1975 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:goldmane,Image:ghcr.io/flatcar/calico/goldmane:v3.30.4,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:7443,ValueFrom:nil,},EnvVar{Name:SERVER_CERT_PATH,Value:/goldmane-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:SERVER_KEY_PATH,Value:/goldmane-key-pair/tls.key,ValueFrom:nil,},EnvVar{Name:CA_CERT_PATH,Value:/etc/pki/tls/certs/tigera-ca-bundle.crt,ValueFrom:nil,},EnvVar{Name:PUSH_URL,Value:https://guardian.calico-system.svc.cluster.local:443/api/v1/flows/bulk,ValueFrom:nil,},EnvVar{Name:FILE_CONFIG_PATH,Value:/config/config.json,ValueFrom:nil,},EnvVar{Name:HEALTH_ENABLED,Value:true,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:config,ReadOnly:true,MountPath:/config,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-key-pair,ReadOnly:true,MountPath:/goldmane-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-zbz8q,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -live],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -ready],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:30,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod goldmane-666569f655-w7zrh_calico-system(4809fb25-1663-4bc2-b12f-599470e2bb91): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.4\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found" logger="UnhandledError" Oct 29 04:42:54.571318 kubelet[1975]: E1029 04:42:54.571279 1975 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found\"" pod="calico-system/goldmane-666569f655-w7zrh" podUID="4809fb25-1663-4bc2-b12f-599470e2bb91" Oct 29 04:42:54.670000 audit[4913]: NETFILTER_CFG table=filter:130 family=2 entries=26 op=nft_register_rule pid=4913 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 29 04:42:54.675783 kernel: audit: type=1325 audit(1761712974.670:1483): table=filter:130 family=2 entries=26 op=nft_register_rule pid=4913 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 29 04:42:54.670000 audit[4913]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffdd1b290b0 a2=0 a3=7ffdd1b2909c items=0 ppid=2117 pid=4913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:54.670000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 29 04:42:54.690000 audit[4913]: NETFILTER_CFG table=nat:131 family=2 entries=104 op=nft_register_chain pid=4913 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Oct 29 04:42:54.690000 audit[4913]: SYSCALL arch=c000003e syscall=46 success=yes exit=48684 a0=3 a1=7ffdd1b290b0 a2=0 a3=7ffdd1b2909c items=0 ppid=2117 pid=4913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:42:54.690000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Oct 29 04:42:55.335821 sshd[4909]: pam_unix(sshd:session): session closed for user core Oct 29 04:42:55.343000 audit[4909]: USER_END pid=4909 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:42:55.343000 audit[4909]: CRED_DISP pid=4909 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:42:55.346522 systemd-logind[1188]: Session 20 logged out. Waiting for processes to exit. Oct 29 04:42:55.348326 systemd[1]: sshd@23-10.230.43.230:22-147.75.109.163:37016.service: Deactivated successfully. Oct 29 04:42:55.348000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.230.43.230:22-147.75.109.163:37016 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:42:55.350203 systemd[1]: session-20.scope: Deactivated successfully. Oct 29 04:42:55.351822 systemd-logind[1188]: Removed session 20. Oct 29 04:42:55.744700 sshd[4900]: Failed password for root from 80.94.95.115 port 31570 ssh2 Oct 29 04:42:57.219498 sshd[4900]: Connection closed by authenticating user root 80.94.95.115 port 31570 [preauth] Oct 29 04:42:57.223230 systemd[1]: sshd@22-10.230.43.230:22-80.94.95.115:31570.service: Deactivated successfully. Oct 29 04:42:57.223000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.230.43.230:22-80.94.95.115:31570 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:42:58.248460 kubelet[1975]: E1029 04:42:58.248268 1975 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-66b476d74-xnzfh" podUID="9af229d2-d1e1-477e-9280-265e378cba4b" Oct 29 04:43:00.490930 systemd[1]: Started sshd@24-10.230.43.230:22-147.75.109.163:47978.service. Oct 29 04:43:00.494459 kernel: kauditd_printk_skb: 9 callbacks suppressed Oct 29 04:43:00.494689 kernel: audit: type=1130 audit(1761712980.491:1489): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.230.43.230:22-147.75.109.163:47978 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:43:00.491000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.230.43.230:22-147.75.109.163:47978 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:43:01.437453 sshd[4947]: Accepted publickey for core from 147.75.109.163 port 47978 ssh2: RSA SHA256:ZzxZ37pC6YJySS9q7Vi2CaqOM6Jn/4IZMTu+T8q4mXw Oct 29 04:43:01.436000 audit[4947]: USER_ACCT pid=4947 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:43:01.445713 kernel: audit: type=1101 audit(1761712981.436:1490): pid=4947 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:43:01.446998 sshd[4947]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 29 04:43:01.444000 audit[4947]: CRED_ACQ pid=4947 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:43:01.455630 kernel: audit: type=1103 audit(1761712981.444:1491): pid=4947 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:43:01.466622 kernel: audit: type=1006 audit(1761712981.445:1492): pid=4947 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=21 res=1 Oct 29 04:43:01.468186 systemd-logind[1188]: New session 21 of user core. Oct 29 04:43:01.476118 kernel: audit: type=1300 audit(1761712981.445:1492): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff2bfde800 a2=3 a3=0 items=0 ppid=1 pid=4947 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:43:01.445000 audit[4947]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff2bfde800 a2=3 a3=0 items=0 ppid=1 pid=4947 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:43:01.476283 systemd[1]: Started session-21.scope. Oct 29 04:43:01.445000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 29 04:43:01.483633 kernel: audit: type=1327 audit(1761712981.445:1492): proctitle=737368643A20636F7265205B707269765D Oct 29 04:43:01.485000 audit[4947]: USER_START pid=4947 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:43:01.494636 kernel: audit: type=1105 audit(1761712981.485:1493): pid=4947 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:43:01.490000 audit[4949]: CRED_ACQ pid=4949 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:43:01.502635 kernel: audit: type=1103 audit(1761712981.490:1494): pid=4949 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:43:02.251904 env[1204]: time="2025-10-29T04:43:02.251727987Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.4\"" Oct 29 04:43:02.319738 sshd[4947]: pam_unix(sshd:session): session closed for user core Oct 29 04:43:02.324000 audit[4947]: USER_END pid=4947 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:43:02.327341 systemd[1]: sshd@24-10.230.43.230:22-147.75.109.163:47978.service: Deactivated successfully. Oct 29 04:43:02.333653 kernel: audit: type=1106 audit(1761712982.324:1495): pid=4947 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:43:02.336105 kernel: audit: type=1104 audit(1761712982.324:1496): pid=4947 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:43:02.324000 audit[4947]: CRED_DISP pid=4947 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:43:02.329991 systemd-logind[1188]: Session 21 logged out. Waiting for processes to exit. Oct 29 04:43:02.334255 systemd[1]: session-21.scope: Deactivated successfully. Oct 29 04:43:02.337801 systemd-logind[1188]: Removed session 21. Oct 29 04:43:02.327000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.230.43.230:22-147.75.109.163:47978 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:43:02.607003 env[1204]: time="2025-10-29T04:43:02.606242134Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 29 04:43:02.608982 env[1204]: time="2025-10-29T04:43:02.608643021Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.4\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found" Oct 29 04:43:02.609538 kubelet[1975]: E1029 04:43:02.609410 1975 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.4\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found" image="ghcr.io/flatcar/calico/whisker:v3.30.4" Oct 29 04:43:02.610251 kubelet[1975]: E1029 04:43:02.609611 1975 kuberuntime_image.go:55] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.4\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found" image="ghcr.io/flatcar/calico/whisker:v3.30.4" Oct 29 04:43:02.610251 kubelet[1975]: E1029 04:43:02.610025 1975 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:whisker,Image:ghcr.io/flatcar/calico/whisker:v3.30.4,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:CALICO_VERSION,Value:v3.30.4,ValueFrom:nil,},EnvVar{Name:CLUSTER_ID,Value:97cf41431c4b47fe94ab130b9db85912,ValueFrom:nil,},EnvVar{Name:CLUSTER_TYPE,Value:typha,kdd,k8s,operator,bgp,kubeadm,ValueFrom:nil,},EnvVar{Name:NOTIFICATIONS,Value:Enabled,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kube-api-access-rq4tk,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-7fbcdbccd-mghcv_calico-system(f101f74a-91c5-460d-8026-7c7655b6a631): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.4\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found" logger="UnhandledError" Oct 29 04:43:02.613944 env[1204]: time="2025-10-29T04:43:02.613468131Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\"" Oct 29 04:43:02.923009 env[1204]: time="2025-10-29T04:43:02.922935524Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 29 04:43:02.924561 env[1204]: time="2025-10-29T04:43:02.924479697Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found" Oct 29 04:43:02.925165 kubelet[1975]: E1029 04:43:02.925087 1975 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.4" Oct 29 04:43:02.925291 kubelet[1975]: E1029 04:43:02.925181 1975 kuberuntime_image.go:55] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.4" Oct 29 04:43:02.926656 kubelet[1975]: E1029 04:43:02.926540 1975 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:whisker-backend,Image:ghcr.io/flatcar/calico/whisker-backend:v3.30.4,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:3002,ValueFrom:nil,},EnvVar{Name:GOLDMANE_HOST,Value:goldmane.calico-system.svc.cluster.local:7443,ValueFrom:nil,},EnvVar{Name:TLS_CERT_PATH,Value:/whisker-backend-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:TLS_KEY_PATH,Value:/whisker-backend-key-pair/tls.key,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:whisker-backend-key-pair,ReadOnly:true,MountPath:/whisker-backend-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:whisker-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-rq4tk,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-7fbcdbccd-mghcv_calico-system(f101f74a-91c5-460d-8026-7c7655b6a631): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found" logger="UnhandledError" Oct 29 04:43:02.927956 kubelet[1975]: E1029 04:43:02.927854 1975 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.4\\\": ghcr.io/flatcar/calico/whisker:v3.30.4: not found\", failed to \"StartContainer\" for \"whisker-backend\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.4\\\": ghcr.io/flatcar/calico/whisker-backend:v3.30.4: not found\"]" pod="calico-system/whisker-7fbcdbccd-mghcv" podUID="f101f74a-91c5-460d-8026-7c7655b6a631" Oct 29 04:43:07.248562 kubelet[1975]: E1029 04:43:07.248383 1975 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"calico-csi\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/csi:v3.30.4\\\": ghcr.io/flatcar/calico/csi:v3.30.4: not found\", failed to \"StartContainer\" for \"csi-node-driver-registrar\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4\\\": ghcr.io/flatcar/calico/node-driver-registrar:v3.30.4: not found\"]" pod="calico-system/csi-node-driver-d8hbp" podUID="78135185-6b36-431d-89d1-d452e0f3a516" Oct 29 04:43:07.477504 systemd[1]: Started sshd@25-10.230.43.230:22-147.75.109.163:47982.service. Oct 29 04:43:07.477000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.230.43.230:22-147.75.109.163:47982 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:43:07.480151 kernel: kauditd_printk_skb: 1 callbacks suppressed Oct 29 04:43:07.480272 kernel: audit: type=1130 audit(1761712987.477:1498): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.230.43.230:22-147.75.109.163:47982 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:43:08.247637 kubelet[1975]: E1029 04:43:08.247545 1975 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.4\\\": ghcr.io/flatcar/calico/goldmane:v3.30.4: not found\"" pod="calico-system/goldmane-666569f655-w7zrh" podUID="4809fb25-1663-4bc2-b12f-599470e2bb91" Oct 29 04:43:08.249208 env[1204]: time="2025-10-29T04:43:08.249062308Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\"" Oct 29 04:43:08.424000 audit[4968]: USER_ACCT pid=4968 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:43:08.436772 kernel: audit: type=1101 audit(1761712988.424:1499): pid=4968 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:43:08.436935 sshd[4968]: Accepted publickey for core from 147.75.109.163 port 47982 ssh2: RSA SHA256:ZzxZ37pC6YJySS9q7Vi2CaqOM6Jn/4IZMTu+T8q4mXw Oct 29 04:43:08.438033 sshd[4968]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Oct 29 04:43:08.435000 audit[4968]: CRED_ACQ pid=4968 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:43:08.446706 kernel: audit: type=1103 audit(1761712988.435:1500): pid=4968 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:43:08.449471 systemd-logind[1188]: New session 22 of user core. Oct 29 04:43:08.451690 systemd[1]: Started session-22.scope. Oct 29 04:43:08.435000 audit[4968]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe5dfbd110 a2=3 a3=0 items=0 ppid=1 pid=4968 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:43:08.469891 kernel: audit: type=1006 audit(1761712988.435:1501): pid=4968 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=22 res=1 Oct 29 04:43:08.470014 kernel: audit: type=1300 audit(1761712988.435:1501): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe5dfbd110 a2=3 a3=0 items=0 ppid=1 pid=4968 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Oct 29 04:43:08.435000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Oct 29 04:43:08.473661 kernel: audit: type=1327 audit(1761712988.435:1501): proctitle=737368643A20636F7265205B707269765D Oct 29 04:43:08.463000 audit[4968]: USER_START pid=4968 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:43:08.483486 kernel: audit: type=1105 audit(1761712988.463:1502): pid=4968 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:43:08.489624 kernel: audit: type=1103 audit(1761712988.473:1503): pid=4983 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:43:08.473000 audit[4983]: CRED_ACQ pid=4983 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:43:08.579979 env[1204]: time="2025-10-29T04:43:08.579014424Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 29 04:43:08.582718 env[1204]: time="2025-10-29T04:43:08.582185174Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found" Oct 29 04:43:08.583199 kubelet[1975]: E1029 04:43:08.583085 1975 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found" image="ghcr.io/flatcar/calico/kube-controllers:v3.30.4" Oct 29 04:43:08.583813 kubelet[1975]: E1029 04:43:08.583227 1975 kuberuntime_image.go:55] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found" image="ghcr.io/flatcar/calico/kube-controllers:v3.30.4" Oct 29 04:43:08.584062 kubelet[1975]: E1029 04:43:08.583742 1975 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:calico-kube-controllers,Image:ghcr.io/flatcar/calico/kube-controllers:v3.30.4,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:KUBE_CONTROLLERS_CONFIG_NAME,Value:default,ValueFrom:nil,},EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:ENABLED_CONTROLLERS,Value:node,loadbalancer,ValueFrom:nil,},EnvVar{Name:DISABLE_KUBE_CONTROLLERS_CONFIG_API,Value:false,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:CA_CRT_PATH,Value:/etc/pki/tls/certs/tigera-ca-bundle.crt,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:tigera-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:tigera-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/cert.pem,SubPath:ca-bundle.crt,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-kp7fs,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/usr/bin/check-status -l],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:10,TimeoutSeconds:10,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:6,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/usr/bin/check-status -r],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:10,PeriodSeconds:30,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*999,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*0,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod calico-kube-controllers-76dd6544c7-psclk_calico-system(7c4e2a15-2feb-448f-b8ed-a786076858ec): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found" logger="UnhandledError" Oct 29 04:43:08.585131 kubelet[1975]: E1029 04:43:08.585048 1975 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-kube-controllers\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/kube-controllers:v3.30.4\\\": ghcr.io/flatcar/calico/kube-controllers:v3.30.4: not found\"" pod="calico-system/calico-kube-controllers-76dd6544c7-psclk" podUID="7c4e2a15-2feb-448f-b8ed-a786076858ec" Oct 29 04:43:09.248066 env[1204]: time="2025-10-29T04:43:09.247593817Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\"" Oct 29 04:43:09.356354 sshd[4968]: pam_unix(sshd:session): session closed for user core Oct 29 04:43:09.361000 audit[4968]: USER_END pid=4968 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:43:09.370715 kernel: audit: type=1106 audit(1761712989.361:1504): pid=4968 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:43:09.371053 kernel: audit: type=1104 audit(1761712989.369:1505): pid=4968 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:43:09.369000 audit[4968]: CRED_DISP pid=4968 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Oct 29 04:43:09.379803 systemd[1]: sshd@25-10.230.43.230:22-147.75.109.163:47982.service: Deactivated successfully. Oct 29 04:43:09.381548 systemd[1]: session-22.scope: Deactivated successfully. Oct 29 04:43:09.383510 systemd-logind[1188]: Session 22 logged out. Waiting for processes to exit. Oct 29 04:43:09.387472 systemd-logind[1188]: Removed session 22. Oct 29 04:43:09.379000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.230.43.230:22-147.75.109.163:47982 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Oct 29 04:43:09.589080 env[1204]: time="2025-10-29T04:43:09.588543537Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 29 04:43:09.590882 env[1204]: time="2025-10-29T04:43:09.590647880Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" Oct 29 04:43:09.591394 kubelet[1975]: E1029 04:43:09.591279 1975 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Oct 29 04:43:09.592025 kubelet[1975]: E1029 04:43:09.591985 1975 kuberuntime_image.go:55] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Oct 29 04:43:09.592814 kubelet[1975]: E1029 04:43:09.592695 1975 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.30.4,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:LOG_LEVEL,Value:info,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-2j29h,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/readyz,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod calico-apiserver-66b476d74-xnzfh_calico-apiserver(9af229d2-d1e1-477e-9280-265e378cba4b): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" logger="UnhandledError" Oct 29 04:43:09.593471 env[1204]: time="2025-10-29T04:43:09.593397752Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\"" Oct 29 04:43:09.593941 kubelet[1975]: E1029 04:43:09.593880 1975 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-66b476d74-xnzfh" podUID="9af229d2-d1e1-477e-9280-265e378cba4b" Oct 29 04:43:09.899887 env[1204]: time="2025-10-29T04:43:09.899552630Z" level=info msg="trying next host - response was http.StatusNotFound" host=ghcr.io Oct 29 04:43:09.900902 env[1204]: time="2025-10-29T04:43:09.900744353Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.4\" failed" error="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" Oct 29 04:43:09.901252 kubelet[1975]: E1029 04:43:09.901166 1975 log.go:32] "PullImage from image service failed" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Oct 29 04:43:09.901393 kubelet[1975]: E1029 04:43:09.901266 1975 kuberuntime_image.go:55] "Failed to pull image" err="rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" image="ghcr.io/flatcar/calico/apiserver:v3.30.4" Oct 29 04:43:09.901750 kubelet[1975]: E1029 04:43:09.901641 1975 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:calico-apiserver,Image:ghcr.io/flatcar/calico/apiserver:v3.30.4,Command:[],Args:[--secure-port=5443 --tls-private-key-file=/calico-apiserver-certs/tls.key --tls-cert-file=/calico-apiserver-certs/tls.crt],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:DATASTORE_TYPE,Value:kubernetes,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_HOST,Value:10.96.0.1,ValueFrom:nil,},EnvVar{Name:KUBERNETES_SERVICE_PORT,Value:443,ValueFrom:nil,},EnvVar{Name:LOG_LEVEL,Value:info,ValueFrom:nil,},EnvVar{Name:MULTI_INTERFACE_MODE,Value:none,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:calico-apiserver-certs,ReadOnly:true,MountPath:/calico-apiserver-certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-vfjnd,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:nil,HTTPGet:&HTTPGetAction{Path:/readyz,Port:{0 5443 },Host:,Scheme:HTTPS,HTTPHeaders:[]HTTPHeader{},},TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod calico-apiserver-66b476d74-9x56r_calico-apiserver(c55cf193-f032-43fb-94cc-3208d0f6de96): ErrImagePull: rpc error: code = NotFound desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": failed to resolve reference \"ghcr.io/flatcar/calico/apiserver:v3.30.4\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found" logger="UnhandledError" Oct 29 04:43:09.902924 kubelet[1975]: E1029 04:43:09.902866 1975 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-apiserver\" with ErrImagePull: \"rpc error: code = NotFound desc = failed to pull and unpack image \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/apiserver:v3.30.4\\\": ghcr.io/flatcar/calico/apiserver:v3.30.4: not found\"" pod="calico-apiserver/calico-apiserver-66b476d74-9x56r" podUID="c55cf193-f032-43fb-94cc-3208d0f6de96"